This class was created by Brainscape user Leonor Figueira.

By:

Decks in this class (25)

02 - Legal Framework
Two principles of criminal law 1,
Cybercrime 2,
Computers can be involved in offe...
14  cards
03 - Digital Investigation Process
What is the first reference model...,
What are the 4 steps in the kruse...,
The step assessment consists of w...
17  cards
04 - Evidence Acquisition
Commercial tools what are its adv...,
Open source tools what are its ad...,
What are ideal properties of fore...
42  cards
05 - Forensic data decoding
Suppose we re inspecting a text f...,
What is the common code text repr...,
How many bits the ascii extension...
32  cards
06 - Steganography and watermarking
What kind of data can be used for...,
How can the receiver obtain the s...,
Can we use more than one least si...
26  cards
07 - Memory Forensics
What is a memory image 1,
To translate a virtual address to...,
In the ia 32 architecture cr3 con...
31  cards
08 - Storage and volume analysis
What is a bit stream copy 1,
What is a volume 2,
Is a partition also a volume 3
38  cards
09 - File system analysis techniques
Why do we want to analyze a file ...,
What is the default file systems ...,
Overview of main extx data struct...
47  cards
10 - File carving
What is orphanfiles 1,
Can orphan files be accessed by s...,
Can orphan files be accessed by s...
35  cards
11 - Evidence in operating system
Rough depiction of stages during ...,
Artifacts result from the os s su...,
Why is os forensics important 3
37  cards
12 - Temporal Analysis
What is ntfs 1,
How are files organized 2,
What is the central paradigm 3
26  cards
13 - Network traffic analyis
Why would we want to analyze traf...,
What is a network trace 2,
What is packet sniffing 3
31  cards
14 - Pitfalls in network addressing
Why are the ip domain name mac po...,
Unreliable network address wrong ...,
Potential pitfalls in interpretin...
24  cards
15 - Investigation of computer networks
How to determine local ip address 1,
How to determine ip address of re...,
How to determine the path between...
30  cards
16 - Wireless networks forensics
Explain the term wi fi 1,
For wi fi traffic the ieee utiliz...,
The frequency ranges are divided ...
43  cards
17 - Email and web forensics
Email makes it lucrative option f...,
Email spamming 2,
Mail bombing 3
33  cards
18 - Deep web and anonymity
What is the deep web 1,
What is the dark web 2,
What is the surface web 2
26  cards
19 - Online Anonymity
Anonymity network 1,
Limitations of public proxy server 2,
Onion routing protocols 3
28  cards
20 - Botnets
What is a botnet 1,
Launching ddos attacks through a ...,
Ddos exploits networking protocols 3
36  cards
21 - Rootkits
What is malware 1,
What are explots 2,
Do all exploits involve file base...
35  cards
22 - Malware analysis
Why analyze malware 1,
Static analysis techniques 2,
Dynamic analysis techniques 3
11  cards
23 - Cryptocurrency investigations
What is the virtual currency of t...,
What is silk road 2,
Why is bitcoin used by cybercrimi...
29  cards
24 - Mobile forensics
Mobile forensics 1,
The linux kernel provides android...,
Android is compatible with numero...
36  cards
25 - Cloud Forensics
The cloud as defined by nist 1,
Cloud service models 2,
Cloud deployment models 3
17  cards
Exam 2024/2025 1
Disconnecting the desktop from th...,
Placing the desktop in sleep mode...,
Since the ipad was unlocked takin...
7  cards

More about
CSF

  • School Unspecified
  • Program type Unspecified
  • Course Unspecified
  • Instructor Unspecified
  • Standards Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....