Term
What are the three categories of traditional crime? |
|
Definition
Violent crime, Property crime, and Public Order crime |
|
|
Term
___________ crime is harder to detect, increasingly sophisticated, and can involve tangible as well as intangible assets. |
|
Definition
|
|
Term
What are the three primary motives for criminal behavior? |
|
Definition
Ego, Personal Gain, and Finance |
|
|
Term
|
Definition
Novel, useful, and non-obvious inventions |
|
|
Term
What is the strongest form of Intellectual property protection? |
|
Definition
|
|
Term
What do trademarks protect? |
|
Definition
The good will associated with a product |
|
|
Term
What do copyrights protect? |
|
Definition
|
|
Term
When is a copyright assumed? |
|
Definition
When it is fixed in a tangible form |
|
|
Term
How long are trade secrets good for? |
|
Definition
As long as the company can keep them a secret |
|
|
Term
What is the name of the agreement that governs the export of encryption systems? |
|
Definition
|
|
Term
___________ can be defined as acting without care |
|
Definition
|
|
Term
Setting policy is considered _________ |
|
Definition
|
|
Term
Enforcing policy is considered __________ |
|
Definition
|
|
Term
In order to monitor employee traffic in a legal fashion internationally, what three conditions must be met? |
|
Definition
Inform those who are being monitored, Monitor fairly and consistently, and and only monitor work related activities |
|
|
Term
What does personally Identifiable Information cover? |
|
Definition
Information that identifies, can be used to contact or locate the person to which it pertains |
|
|
Term
What restricts a company's ability to monitor employees? |
|
Definition
Reasonable Expectation of Privacy |
|
|
Term
______________ is about proactively preparing for, and reactively responding to, an incident |
|
Definition
|
|
Term
__________ is any event that has the potential to negatively impact the business or its assets |
|
Definition
|
|
Term
What are the four steps of Incident Response? |
|
Definition
1. Detecting a problem 2. Determining cause 3. Minimizing damage 4. Resolving the problem |
|
|
Term
What are the three main elements of Incident Response? |
|
Definition
Detection, Triage, and Response |
|
|
Term
What is the first step in establishing a foundation for Incident Response? |
|
Definition
|
|
Term
What are the four stages in the Incident Response and Handling Process? |
|
Definition
Triage, Investigation, Containment, and Analysis and Tracking |
|
|
Term
What are the three steps in the triage process? |
|
Definition
Detection, Classification, and Notification |
|
|
Term
What are the four parts of the investigative process? |
|
Definition
Identify Suspects, Identify Witnesses, Identify System, and Identify Team |
|
|
Term
What is Ownership and Possession Analysis? |
|
Definition
Identifying who Created, Modified, or Accessed data |
|
|
Term
|
Definition
Means Opportunity and Motive |
|
|
Term
What is the difference between Interviewing and Interrogation? |
|
Definition
Interviewing is open ended questioning and is not adversarial and Interrogation is adversarial and uses closed ended questioning |
|
|
Term
What are the two possible outcomes of public disclosure of a security incident? |
|
Definition
Compound the negative impact and provide an opportunity to regain the public trust |
|
|
Term
The idea that a criminal will bring something to the crime scene and leave with something is known as ___________ |
|
Definition
Locard's Principle of Exchange |
|
|
Term
In what order should you collect digital evidence? |
|
Definition
|
|
Term
A statement made to a witness where the witness cannot personally attest to its accuracy is known as __________. |
|
Definition
|
|
Term
Computer forensics is made up of procedures and protocols which are ________, ________, ________ and __________. |
|
Definition
Methodical, Repeatable, Defensible, and Auditable |
|
|
Term
______________ is the disciplined and detailed process of searching a drive for information. |
|
Definition
|
|
Term
___________ is meant to enhance corporate governance through measures that will strengthen internal checks and balances and, ultimately, strengthen corporate accountability. |
|
Definition
|
|
Term
___________ is designed to protect the privacy of consumer information held by financial institutions. |
|
Definition
Gramm-Leach-Bliley Act (GLBA) |
|
|
Term
The ___________ sets out the classification levels and access controls for each piece of sensitive information. |
|
Definition
|
|
Term
The ____________ is responsible for ensuring personnel in his or her area are complying with policy. |
|
Definition
|
|
Term
The ___________ provides verification of risks and the compliance environment as a third-party obeserver. |
|
Definition
|
|
Term
|
Definition
A formal, written examination of one or more crucial components of the organization |
|
|
Term
___________ are metrics or quantifiable measurements |
|
Definition
Key Performance Indicators |
|
|
Term
What is the role of the auditor? |
|
Definition
Comparing the stated policies with the actual controls in place |
|
|
Term
Compliance should be in accordance with _________, _________, and _________. |
|
Definition
Guidelines, specifications, and legislation |
|
|
Term
Who is the person with the greatest single responsibility for compliance? |
|
Definition
|
|
Term
What are the three categories of computer forensics? |
|
Definition
Media, Network Traffic, and Software |
|
|
Term
What must be answered as it relates to the chain of custody? |
|
Definition
Who, what, when, where, and how |
|
|
Term
Why is it important to have two copies of investigated media? |
|
Definition
To have a control copy in the event that the working copy is damaged |
|
|
Term
___________ is free for use but the author still retains the copyright. |
|
Definition
|
|
Term
What is the most important guideline to provide to incident investigators? |
|
Definition
Do not exceed your knowledge or capabilities |
|
|