Definition 1 of 229
literally changes its form from time to time to avoid detection by antivirus software. A more
advanced form of this is called the Metamorphic virus; it can completely rewrite itself.
Polymorphic virus
Metamorphic virus
Macro virus
Armored virus
Definition 2 of 229
Protects children 13 years of age and under from the collection and use of their personal
information by websites. It replaces the Child Online Protection Act of 1988 (COPA), which was
determined to be unconstitutional.
The family educational rights and privacy act of 1974
The children's internet protection act of 2000
The Children's Online Privacy Protection Act of 1998
The digital millennium copyright act of 1998
Definition 3 of 229
A broad category of crime that can encompass many different activities, but essentially any
attempt to gain financial reward through deception.
Fraud
Identity Theft
Cyberstalking
Defamation
,Definition 4 of 229
This act covers access to a facility through which electronic communication is provided or
exceeding the access that was authorized. It is broadly written to apply to a range of offenses.
Punishment can be up to 5 years in prison and fines for the first offense. The SCA governs how
investigators can obtain stored account records and contents from network service providers,
including Internet service providers ("ISPs"), telephone companies, and cell phone service
providers. SCA issues arise often in cases involving the Internet: when investigators seek stored
information concerning Internet accounts from providers of Internet service.
Internet message access protocol (imap)
Disaster recovery plan (drp)
American standard code for information interchange (ascii)
Unlawful Access to Stored Communications (18 U.S.C. § 2701)
Term 5 of 229
What law applies to intercepting communications with the computer owner's permission?
A risk management approach to quantifying vulnerability data and then taking into account
the degree of risk to different types of systems or information.
Governs the privacy and disclosure, access, and interception of content and traffic data
related to electronic communications.
18 U.S.C. 2511 is the embodiment of the Electronic Communications Privacy Act (ECPA) of
1986 into criminal law. It is a crime to intentionally intercept, disclose, or use any wire, oral,
or electronic communication in violation of federal law.
This law applies to any person who is not a party to the communication and who
intentionally intercepts, discloses, or uses that communication without the consent of at
least one party.
Contains many provisions about recordkeeping and destruction of electronic records
relating to the management and operation of publicly held companies.
,Definition 6 of 229
The result of acquiring a file as it is being updated.
Caesar cipher
Symmetric cryptography
Slurred image
Swap file
Definition 7 of 229
attacks the computer in multiple ways—for example, infecting the boot sector of the hard disk and
one or more files.
Common virus
Worm
Boot-sector virus
Multi-partite virus
Definition 8 of 229
The last bit or least significant bit is used to store data.
Universal disk format (udf)
Asynchronous transfer mode (atm)
Least significant bit (LSB)
Base transceiver station (bts)
, Term 9 of 229
LILO (Linux Loader)
A command-line interface for linux.
One of the Linux boot loaders.
A graphical user Interface for linux.
A type of Linux file system.
Definition 10 of 229
The process of examining network traffic, including transaction logs and real-time monitoring.
Digital evidence
Expert testimony
Live system forensics
Network forensics
Definition 11 of 229
Offline analysis conducted on an evidence disk or forensic duplicate after booting from a CD or
another system.
Physical analysis
Logical analysis
Digital evidence
Volatile memory analysis
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller stuuviaa. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.