每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered.

Slides:



Advertisements
Similar presentations
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Advertisements

Nabil dmaidi1 Miller Act H Enacted in 1935 H Federal Contracts over $25,000 H Contractor shall provide Bonds H Performance Bonds in the amount to protect.
The Data Protection (Jersey) Law 2005.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
TRADE SECRETS, UNFAIR COMPETITION, EMPLOYEE RAIDS AND EMPLOYEE COVENANTS Alan N. Greenspan Jackson Walker LLP.
Chapter 4.3 Choose the legal form of your Business
HAZARD COMMUNICATIONS / E N V I R O N H & S T R A I N I N G P R O G R A M HAZARD COMMUNICATION PROGRAM OSHA Standard 29 CFR The OSHA hazard communication.
ACCOUNTING ETHICS Lect. Victor-Octavian Müller, Ph.D.
Evidence Collection & Admissibility Computer Forensics BACS 371.
6-1 Full and Fair Reporting Electronic Presentation by Douglas Cloud Pepperdine University Chapter F6.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Guide to Computer Forensics and Investigations, Second Edition
Chapter 2 Reporting and Analyzing Cash and Internal Controls
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Legal, Regulations, Compliance and Investigations.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
IS Audit Function Knowledge
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
1 Software Testing and Quality Assurance Lecture 37– SWE 205 Course Objective: Learn about ethical issues of software engineering.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Code of Ethics – Discussion Question
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Network security policy: best practices
Internal Auditing and Outsourcing
Legal Aspects of Computer System Security “Security - Protecting Our Resources”
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Proving Your Case - Computer Security Terrence P. Maher Abrahams Kaslow & Cassman
NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 4 INVESTIGATION.
February 2007 Commercial Vehicle Drivers Hours of Service Module 24: Daily Log Audits.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
AGENCY. Introduction Agency One person acts for the benefit of and under the direction of another Agent Person acting for the benefit of another Principal.
Archiving of Electronic Records Inta Feldmane Directorate General of Latvia State Archives.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
CHAPTERCHAPTER McGraw-Hill/Irwin©2008 The McGraw-Hill Companies, All Rights Reserved Statute of Frauds SIXSIX.
Computer Forensics Principles and Practices
Internal Controls and Fraud Convery Describe an Internal Controls System and its elements Identify specific Internal Control issues in a NPO Consider.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 7 Fraud, Ethics, and Controls.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Unit 9: Electronic Fraud Professor Thomas Genovese.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Twelve: Documentary and Scientific Evidence This multimedia product and its contents are protected.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
THE RIGHTS AND OBLIGATIONS OF EMPLOYER AND EMPLOYEE
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
Introduced some basic knowledge of the contract First, what is the contract? Contract, also known as contract. China's definition of the contract, the.
Chapter 38 Agency Twomey, Business Law and the Regulatory Environment (14th Ed.)
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Chapter 3-Auditing Computer-based Information Systems.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
CITY OF PHOENIX RECORDS MANAGEMENT AND E-PRIVACY Margie Pleggenkuhle City Clerk Department March 18, 2004.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Responsibilities of Test Facility Management, Study Director, Principal Investigator and Study Personnel G. Jacobs Belgian GLP Monitorate Zagreb, 17 December.
PROACTIVE AND KNOWLEDGE BASED APPROACH IN COMBATING ORGANISED CRIME. VAT RELATED FRAUD Andris Vilks Minister of Finance Republic of Latvia.
TRADE SECRETS workshop I © 2009 Prof. Charles Gielen EU-China Workshop on the Protection of Trade Secrets Shanghai June 2009.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Red Flags Rule An Introduction County College of Morris
Archiving of Electronic Records
Computers: Tools for an Information Age
Operationalizing Export Certification and Regionalization Programmes
Legal and Ethical Responsibilities
Presentation transcript:

每时每刻 可信安全 1 Since disks and other magnetic media are only copies of the actual or original evidence, what type of evidence are they are often considered to represent? A Hearsay B Irrelevant C Incomplete D Secondary A

每时每刻 可信安全 2 Which of the following categories of hackers poses the greatest threat? A Disgruntled employees B Student hackers C Criminal hackers D Corporate spies A

每时每刻 可信安全 3 Under the principle of culpable negligence, executives can be held liable for losses that result from computer system breaches if: A the company is not a multi-national company. B they have not exercised due care protecting computing resources. C they have failed to properly insure computer resources against loss. D the company does not prosecute the hacker that caused the breach. B

每时每刻 可信安全 4 Once an intrusion into your organization's information system has been detected, which of the following actions should be performed first? A Eliminate all means of intruder access. B Contain the intrusion. C Determine to what extent systems and data are compromised. D Communicate with relevant parties C

每时每刻 可信安全 5 When should a post-mortem review meeting be held after an intrusion has been properly taken care of? A Within the first three months after the investigation of the intrusion is completed. B Within the first week after prosecution of intruders have taken place, whether successful or not. C Within the first month after the investigation of the intrusion is completed. D Within the first week of completing the investigation of the intrusion D

每时每刻 可信安全 6 Which element must computer evidence have to be admissible in court? A It must be relevant. B It must be annotated. C It must be printed. D It must contain source code A

每时每刻 可信安全 7 When companies come together to work in an integrated manner such as extranets, special care must be taken to ensure that each party promises to provide the necessary level of protection, liability and responsibility. These aspects should be defined in the contracts that each party signs. What describes this type of liability? A Cascade liabilities B Downstream liabilities C Down-flow liabilities D Down-set liabilities B

每时每刻 可信安全 8 Which of the following is not a problem regarding computer investigation issues? A Information is intangible. B Evidence is difficult to gather. C Computer-generated records are only considered secondary evidence, thus are not as reliable as best evidence. D In many instances, an expert or specialist is required C

每时每刻 可信安全 9 In order to preserve a proper chain of custody of evidence: A Evidence has to be collected following predefined procedures in accordance with all laws and legal regulations. B Law enforcement officials should be contacted for advice on how and when to collect critical information. C Verifiable documentation indicating the sequence of individuals who have handled a piece of evidence should be available. D Log files containing information regarding an intrusion are retained for at least as long as normal business records, and longer in the case of an ongoing investigation C

每时每刻 可信安全 10Which of the following statements regarding trade secrets is false? A For a company to have a resource qualify as a trade secret, it must provide the company with some type of competitive value or advantage. B The Trade Secret Law normally protects the expression of the idea of the resource. C Many companies require their employees to sign nondisclosure agreements regarding the protection of their trade secrets. D A resource can be protected by law if it is not generally known and if it requires special skill, ingenuity, and/or expenditure of money and effort to develop it B

每时每刻 可信安全 The deliberate planting of apparent flaws in a system for the purpose of detecting attempted penetrations or confusing an intruder about which flaws to exploit is called: A alteration. B investigation. C re-direction. D enticement D

每时每刻 可信安全 12 Phreakers are hackers who specialize in telephone fraud. What type of telephone fraud simulates the tones of coins being deposited into a payphone? A Red Boxes B Blue Boxes C White Boxes D Black Boxes A

每时每刻 可信安全 13 To understand the 'whys' in crime, many times it is necessary to understand MOM. Which of the following is not a component of MOM? A Opportunities B Methods C Motivation D Means B