2 cissp ® Official Study Guide Eighth Edition


Know the definition of computer crime



Download 19,3 Mb.
Pdf ko'rish
bet803/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   799   800   801   802   803   804   805   806   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Know the definition of computer crime.
Computer crime is a crime (or violation of a law 
or regulation) that is directed against, or directly involves, a computer.
Be able to list and explain the six categories of computer crimes.
Computer crimes are 
grouped into six categories: military and intelligence attack, business attack, financial 
attack, terrorist attack, grudge attack, and thrill attack. Be able to explain the motive of 
each type of attack.
Know the importance of collecting evidence.
As soon you discover an incident, you must 
begin to collect evidence and as much information about the incident as possible. The evi-
dence can be used in a subsequent legal action or in finding the identity of the attacker. 
Evidence can also assist you in determining the extent of damage.
Understand the eDiscovery process.
Organizations that believe they will be the target of a 
lawsuit have a duty to preserve digital evidence in a process known as electronic discovery, 
or eDiscovery. The eDiscovery process includes information governance, identification, pres-
ervation, collection, processing, review, analysis, production, and presentation activities.


Written Lab 
865
Know how to investigate intrusions and how to gather sufficient information from the 
equipment, software, and data.
You must have possession of equipment, software, or data 
to analyze it and use it as evidence. You must acquire the evidence without modifying it or 
allowing anyone else to modify it.
Know the three basic alternatives for confiscating evidence and when each one is appropriate.
First, the person who owns the evidence could voluntarily surrender it. Second, a subpoena 
could be used to compel the subject to surrender the evidence. Third, a search warrant is 
most useful when you need to confiscate evidence without giving the subject an opportunity 
to alter it.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   799   800   801   802   803   804   805   806   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish