Computer Forensics Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

public private community hybrid

four types of cloud deployments

reconstruction

process of rebuilding data files

private

type of cloud deployment that can be accessed only by people who have the necessary credentials

hybrid

type of cloud deployment that enables a company to keep some information private and designate other files as public or private information

community

type of cloud deployment that is a way to bring people together for a specific purpose

public

type of cloud deployment that is accessible to anyone

MAC address

unique serial number assigned to each network adapted, making it possible to deliver data packets to a destination within a subnetwork

chain of custody

Route the evidence takes from the time you find it until the case is closed or goes to court

volatile storage

The entire contents of this type of memory are erased when you turn off the computer; like RAM

cloud computing

A computing storage system that provides on-demand network access for multiple users and can allocate storage to users to keep up with changes in their needs

static acquisition

A data acquisition method used when a suspect drive is write-protected and can't be altered. If disk evidence is preserved correctly, static acquisitions are repeatable.

search warrant

A written authorization from a court specifying the area to be searched and what the police are searching for.

BIOS

Basic Input/Output System; responsible for loading the OS

encrypted

Encoded; converted from one system of communication to another

IaaS

Infrastructure as a Service; customers can rent hardware and install whatever OSs and applications they need; the whole IT infrastructure goes into someone else's computer (in the cloud)

PaaS

Platform as a Service; an OS has been installed on a cloud server; doesn't live in your data center, lives in other people's computers

SaaS

Software as a Service; applications are delivered via the internet; google apps

Non-volatile storage

Storage which does not lose its contents when the power is removed

windows registry

a file that keeps track of all hardware and software configuration settings, network connections and user preferences

Steganography

a method of hiding data by using a host file to cover the contents of a secret message

cluster search

a search which looks for a keyword in all data, including unallocated data

disk partition

a section of a hard disk drive that is treated as a separate storage unit; logical drive

bitmap graphics

a series of pixels on a grid, and each dot/pixel have a particular color value in RGB sector; dependent on screen resolution for its image quality

validation and verification

a way to confirm that the tool is functioning as intended & the processes of proving that two sets of data are identical using hash

sparse data copy

acquisition method that captures only specific files of interest but also collects fragments of unallocated data

logical disk to disk

acquisition method that captures only specific files of interest to the case

disk to disk

acquisition method that copies the entire disk to a similar disk, creating two identical copies

disk to image

acquisition method that creates a bit for bit replication of the original drive

creating the contents of a file

application program's responsibilities

reporting

bookmarking and tagging, log reports, timelines, report generators

metafile graphics

combination of bitmap and graphic; picture taken with a camera is bitmap graphic and then putting it in a program like adobe illustrator which can do vector graphics

metadata

data about data

live acquisition

data acquisition method used when a suspect computer can't be shut down to perform acquisition; captured data might be altered because it is not write-protected; not repeatable because data is continually being changed because machine is on

file system

determines the way an operating system stores files on a disk

application program

does not write files to the disk but is responsible for making those files

Insertion Steganography

hidden data is not displayed when viewing the host file in its associated program

steganography

hides information inside image files

mac OS

hierarchical file system, data fork and resource fork; HFS and HFS+ came before this

unix OS

multi-user multi-thread secure OS; four components: boot block, super block, inode block, data block

HFS+

newest file system for apple

Plain View Doctrine

objects in plain sight where the officer has the right to be in the position are admissible in court

organizing and saving files to the disk

operating system's responsibilities

NTFS

proprietary file system developed by microsoft

RAID

redundant array of independent disks; a computer configuration involving two or more physical disks

substitution steganography

replaces bits of the host file with other bits of data

computer forensic science

science used to discover evidence for the court of law in a criminal or civil case

operating system

software that controls the operation of a computer and directs the processing of programs

OS

starts with power, responsible for talking to devices, managing the devices, managing the file system, memory management

computer forensics

the application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence

acquisition

the process of creating and duplicating an image of the data

extraction

the process of pulling relevant data from an image and recovering data fragments

SaaS PaaS IaaS

three main service levels of the cloud

virtual machine

used extensively in organizations and are a common part of forensic investigations . Investigators must be familiar with file extensions that indicate the existence of them; they help offset the hardware costs for companies and are handy when you want to run legacy or uncommon OS's or software

vector graphics

uses lines and it uses mathematical formulas to calculate the lines; can be resized without looking pixelated


Ensembles d'études connexes

Classification of Controlled Substances

View Set

Module 1: Introduction to Management

View Set

Intro to networks final exam study guide

View Set

Lesson 3: Planning and Building a Business- EverFi

View Set