WGU C725 Information Security and Assurance SET X (Latest 2023 – 2024) With Complete Solutions
A type of analysis in which the task of the analyst is
... [Show More] to collect and correlate information from multiple disparate sources and produce as comprehensive a picture of network activity as possible.Methods include:- Intrusion detection and prevention system logs- Network flow data captured by a flow monitoringsystem- Packet captures deliberately collected during an incident- Logs from firewalls and other network security devices - Network Analysis
A branch of computer forensic analysis, involves the identification and extraction of information from storage media.This may include the following:Magnetic media (e.g., hard disks, tapes)Optical media (e.g., compact discs (CDs), digital versatile discs (DVDs), Blu-ray discs)Memory (e.g., random-access memory (RAM), solid-state storage)Techniques used for this type of analysis may include the recovery of deleted files from unallocated sectors of the physical disk, the live analysis of storage media connected to a computer system (especially useful when examining encrypted media), and the static analysis of forensic images of storage media. - Media Analysis
A type of analysis in which an analyst may conduct a review of software code, looking for back doors, logic bombs, interpret the log files from application or database servers, seeking other signs of malicious activity, such as SQL injection attacks, privilege escalations, or other application attacks. - Software Analysis
A type of Analysis in which an analyst may review the contents of hardware and embedded devices.This may include a review of:Personal computersSmartphonesTablet computersEmbedded computers in cars, security systems, and other devicesAnalysts conducting these reviews must have specialized knowledge of the systems under review. This often requires calling in expert consultants who are familiar with the memory, storage systems, and operating systems of such devices. Because of the complex interactions between software, hardware, and storage, the discipline of hardware analysis requires skills in both media analysis and software analysis.Investigation Process - Hardware/Embedded Device Analysis
True or False
Gathering Evidence allows three common alternatives:Voluntary surrender, subpoena, search warrant - True
- Military and intelligence attacks
- Business attacks
- Financial attacks
- Terrorist attacks
- Grudge attacks
- Thrill attacks - Types of Computer crimes
A category of computer crime attacks in which are launched primarily to obtain secret and restricted information from law enforcement or military and technological research sources. - Military and intelligence attacks
A category of computer crime attacks in which is focused on illegally obtaining an organization's confidential information. This could be information that is critical to the operation of the organization, such as a secret recipe, or information that could damage the organization's reputation if disclosed, such as personal information about its employees. - Business Attacks
A category of computer crime attacks in which are carried out to unlawfully obtain money or services. They are the type of computer crime you most commonly hear about in the news. The goal of a financial attack could be to steal credit card numbers, increase the balance in a bank account, or place "free" long-distance telephone calls. - Financial Attacks
A category of computer crime attacks in which the goal is to disrupt normal life and instill fear. - Terrorist Attacks
A category of computer crime attacks in which are carried out to damage an organization or a person. The damage could be in the loss of information or information processing capabilities or harm to the organization or a person's reputation. - Grudge Attacks
A category of computer crime attacks in which are launched only for the fun of it. Attackers who lack the ability to devise their own attacks will often download programs that do their work for them. These attackers are often called script kiddies because they run only other people's programs, or scripts, to launch an attack. [Show Less]