Final Topics

Submitted by: Submitted by

Views: 10

Words: 460

Pages: 2

Category: Other Topics

Date Submitted: 01/20/2016 04:11 PM

Report This Essay

What is digital forensics? 

What is a computer crime? 

Which of the following crimes cause the largest cost financially to businesses? 

What is a computer virus? 

What is the difference between a computer virus and a worm? 

Trojan horse

Spam

Spoofing

Email or Virus hoax

Trojan-horse virus

Key logger software

Email deception

Virus ruse

Macro virus

Denial-of-service attack

Intelligent tools

Bots

Agents

Malware

Zombie or drone 

Rookit

Hacker

Thrill-seeker hacker

White-hat hacker

Black-hat hacker

Who are cyber vandals? 

Crackers

Political hacker

Cyber hacker

Black-hat cracker

Cyberterrorist

In digital forensics, what is the first phase in the investigation? 

Planning

Collection

Authentication and preservation

Analysis

Slack space

Forensic image copy

MD5 hash value 

Forensics certificate

Digital authentication

Fraud

Static electricity

Device Seizure

Data recovery

Data Buster

Forensic Information Salvaging Technology (FIST)

What is latent semantic analysis? 

In digital forensics, what is the second phase of the investigation? 

What is a live analysis? 

Why is a live analysis needed in digital forensics? 

If you were disposing of your computer along with its hard drive, what should you do beforehand to ensure that someone does not access and use your personal information? 

What happens when you delete a computer file? 

Can you recover a deleted computer file? 

What is virtual memory? 

Disk directory

System settings

System preferences and configuration settings

The Registry

disk wiping program

Rename the file

Defrag the computer

Press Shift + Delete instead of just Delete

Clear temporary Internet files and the history file

Redacting

Encrypted

Steganography

Ethics

Ethical dilemma

Consequences

Society's opinion

Likelihood of effect

Time from action

Copyright

Patent law

Fair Use Doctrine

Pirating laws

Intellectual property

copyright infringement

backup copies 

Spam

Phishing

What is identity...