Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C840 Digital Forensics in Cybersecurity 2023

Beoordeling
-
Verkocht
-
Pagina's
3
Cijfer
A+
Geüpload op
29-03-2023
Geschreven in
2022/2023

WGU C840 Digital Forensics in Cybersecurity 2023 The Computer Security Act of 1987 Passed to improve the security and privacy of sensitive information in federal computer systems. The law requires the establishment of minimum acceptable security practices, creation of computer security plans, and training of system users or owners of facilities that house sensitive information. The Foreign Intelligence Surveillance Act of 1978 (FISA) A law that allows for collection of "foreign intelligence information" between foreign powers and agents of foreign powers using physical and electronic surveillance. A warrant is issued by a special court created by this Act for actions under this Act. The Child Protection and Sexual Predator Punishment Act of 1998 Requires service providers that become aware of the storage or transmission of child pornography to report it to law enforcement. The Children's Online Privacy Protection Act of 1998 (COPPA) Protects children 13 years of age and under from the collection and use of their personal information by Web sites. This act replaces the Child Online Protection Act of 1988 (COPA), which was determined to be unconstitutional. The Communications Decency Act of 1996 Designed to protect persons 18 years of age and under from downloading or viewing material considered indecent. This act has been subject to court cases that subsequently changed some definitions and penalties The Telecommunications Act of 1996 Includes many provisions relative to the privacy and disclosure of information in motion through and across telephony and computer networks. The Wireless Communications and Public Safety Act of 1999 Allows for collection and use of "empty" communications, which means nonverbal and nontext communications, such as GPS information. The USA Patriot Act The primary law under which a wide variety of Internet and communications information content and metadata is currently collected. Provisions exist within the Act to protect the identity and privacy of U.S. citizens The Sarbanes-Oxley Act of 2002 (SOX) Contains many provisions about record-keeping and destruction of electronic records relating to the management and operation of publicly held companies. Anti-forensics The actions that perpetrators take to conceal their locations, activities, or identities. Cell-phone forensics The process of searching the contents of cell phones. Chain of custody The continuity of control of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferably unaltered Computer forensics The use of analytical and investigative techniques to identify, collect, examine and preserve computer-based material for presentation as evidence in a court of law Curriculum Vitae (CV) An extensive document expounding one's experience and qualifications for a position, similar to a resume but with more detail. In academia and expert work, a CV is usually used rather than a resume Daubert Standard The standard holding that only methods and tools widely accepted in the scientific community can be used in court. Demonstrative Evidence Information that helps explain other evidence. And example is a chart that explains a technical concept to the judge and jury Digital Evidence Information that has been processed and assembled so that it is relevant to an investigation and supports a specific finding or determination Disk Forensics The process of acquiring and analyzing information stored on physical storage media, such as computer hard drives or smartphones Documentary Evidence Data stored in written form, on paper or in electronic files, such as email messages and telephone call-detail records. Investigators must authenticate documentary evidence. Email Forensics The study of the source and content of email as evidence, including the identification of the sender, recipient, date, time, and origination location of an email message. Expert Report A formal document prepared by a forensics specialist to document an investigation, including a list of all tests conducted as well as the specialist's own Curriculum Vitae (CV). Anything the specialist plans to testify about at a trial must be included in the expert report. Expert Testimony The testimony of an expert witness, one who testifies on the basis of scientific or technical knowledge relevant to a case, rather than personal experience. Internet Forensics The process of piecing together where and when a user has been on the Internet Live System Forensics The process of searching memory in real-time, typically for working with compromised hosts or to identify system abuse. Network Forensics The process of examining network traffic, including transaction logs and real-time monitoring. Real Evidence Physical objects that can be touched, held, or directly observed, such as a laptop with a suspect's fingerprints on it, or a handwritten note. Software Forensics The process of examining malicious computer code Testimonial Evidence Information that forensic specialists use to support or interpret real or documentary evidence; for example, to demonstrate that the fingerprints found on a keyboard are those of a specific individual Volatile Memory Computer Memory that requires power to maintain the data it holds, and can be changed. RAM is highly volatile; EEPROM is very non-volatile

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU C840 Digital Forensics in
Cybersecurity 2023
The Computer Security Act of 1987 ✔✔Passed to improve the security and privacy of sensitive
information in federal computer systems. The law requires the establishment of minimum acceptable
security practices, creation of computer security plans, and training of system users or owners of
facilities that house sensitive information.



The Foreign Intelligence Surveillance Act of 1978 (FISA) ✔✔A law that allows for collection of "foreign
intelligence information" between foreign powers and agents of foreign powers using physical and
electronic surveillance. A warrant is issued by a special court created by this Act for actions under this
Act.



The Child Protection and Sexual Predator Punishment Act of 1998 ✔✔Requires service providers that
become aware of the storage or transmission of child pornography to report it to law enforcement.



The Children's Online Privacy Protection Act of 1998 (COPPA) ✔✔Protects children 13 years of age and
under from the collection and use of their personal information by Web sites. This act replaces the Child
Online Protection Act of 1988 (COPA), which was determined to be unconstitutional.



The Communications Decency Act of 1996 ✔✔Designed to protect persons 18 years of age and under
from downloading or viewing material considered indecent. This act has been subject to court cases that
subsequently changed some definitions and penalties



The Telecommunications Act of 1996 ✔✔Includes many provisions relative to the privacy and disclosure
of information in motion through and across telephony and computer networks.



The Wireless Communications and Public Safety Act of 1999 ✔✔Allows for collection and use of "empty"
communications, which means nonverbal and nontext communications, such as GPS information.



The USA Patriot Act ✔✔The primary law under which a wide variety of Internet and communications
information content and metadata is currently collected. Provisions exist within the Act to protect the
identity and privacy of U.S. citizens

Geschreven voor

Vak

Documentinformatie

Geüpload op
29 maart 2023
Aantal pagina's
3
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.09
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
CertifiedGrades Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
145
Lid sinds
3 jaar
Aantal volgers
61
Documenten
8739
Laatst verkocht
1 maand geleden
High Scores

Hi there! Welcome to my online tutoring store, your ultimate destination for A+ rated educational resources! My meticulously curated collection of documents is designed to support your learning journey. Each resource has been carefully revised and verified to ensure top-notch quality, empowering you to excel academically. Feel free to reach out to consult with me on any subject matter—I'm here to help you thrive!

3.9

38 beoordelingen

5
21
4
6
3
2
2
3
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen