100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Digital Forensics in Cybersecurity - C840 $10.29   Add to cart

Exam (elaborations)

Digital Forensics in Cybersecurity - C840

 7 views  0 purchase
  • Course
  • Institution

Digital Forensics in Cybersecurity - C840 FAT Stores file locations by sector in a file called the file allocation table. This table contains information about which clusters are being used by which particular files and which clusters are free to be used. NTFS (New Technology File System) Fil...

[Show more]

Preview 2 out of 15  pages

  • March 29, 2023
  • 15
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Digital Forensics in Cybersecurity - C840
FAT

Stores file locations by sector in a file called the file allocation table. This table contains information
about which clusters are being used by which particular files and which clusters are free to be used.

NTFS (New Technology File System)

File system used by Windows NT 4, 2000, XP, Vista, 7, Server 2003, and Server 2008. One major
improvement of this system was the increased volume sizes.

Extended file system

System created specifically for Linux. There have been many versions; the current version is 4.

ReiserFS

Popular journaling file system, used primarily with Linux. It was the first file system to be included with
the standard Linux kernel, and first appeared in kernel version 2.4.1.

The Berkeley Fast File System

This is also known as the UNIX file system. Uses a bitmap to track free clusters, indicating which clusters
are available and which are not.

Data hiding

Storage of data where an investigator is unlikely to find it.

Data transformation

Disguising the meaning of information.

Data contraception

Storage of data where a forensic specialist cannot analyze it.

Data fabrication

Uses false positives and false leads extensively.

File system alteration

Corruption of data structures and files that organize data.

Daubert standard

Any scientific evidence presented in a trial has to have been reviewed and tested by the relevant
scientific community. For a computer forensics investigator, that means that any tools, techniques, or
processes you utilize in your investigation should be ones that are widely accepted in the computer
forensics community. You cannot simply make up new tests or procedures. (1) whether the theory or
technique in question can be and has been tested; (2) whether it has been subjected to peer review and

, publication; (3) its known or potential error rate; (4) the existence and maintenance of standards
controlling its operation; and (5) whether it has attracted widespread acceptance within a relevant
scientific community.

The Federal Privacy Act of 1974

Prohibits unauthorized disclosures of records( about people, citizens, individuals) maintained by Federal
Agencies. Also allows individuals the ability to request to review their record.

The Privacy Protection Act of 1980

(PPA) of 1980 protects journalists from being required to turn over to law enforcement any work
product and documentary materials, including sources, before it is disseminated to the public.
Journalists who most need the protection of the PPA are those who are working on stories that are
highly controversial or about criminal acts because the information gathered may also be useful to law
enforcement.

The Communications Assistance to Law Enforcement Act of 1994

a federal wiretap law for traditional wired telephony to allow cops to wiretap with a warrant. It was
expanded to include wireless, voice over packet, and other forms of electronic communications,
including signaling traffic and metadata.

The Electronic Communications Privacy Act of 1986

Prevents unauthorized government access to individuals' private electronic communications (things
done on the computer or saved on the computer)

The Computer Security Act of 1987

was passed to improve the security and privacy of sensitive information in federal computer systems.
The law requires the establishment of minimum acceptable security practices, creation of computer
security plans, and training of system users or owners of facilities that house sensitive information.

The Foreign Intelligence Surveillance Act of 1978

(FISA) is a law that allows for collection of "foreign intelligence information" between foreign powers
and agents of foreign powers using physical and electronic surveillance. A warrant is issued by the FISA
court for actions under FISA.

The Child Protection and Sexual Predator Punishment Act of 1998

requires service providers that become aware of the storage or transmission of child pornography to
report it to law enforcement.

The Children's Online Privacy Protection Act of 1998

(COPPA) protects children 13 years of age and under from the collection and use of their personal
information by Web sites. It is noteworthy that COPPA replaces the Child Online Protection Act of 1988
(COPA), which was determined to be unconstitutional.

The Communications Decency Act of 1996

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller CertifiedGrades. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.29. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77529 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.29
  • (0)
  Add to cart