Glossary_Of_DF_Terms..

advertisement
Glossary Of Digital
Forensics-Related Terms
25 January 2013
Allocated Space: The clusters on a storage device that have been assigned to store data (also
referred to as used space). When a file is to be written, the file system finds unused (i.e.,
unallocated) space on the medium and starts writing the data; the status of the clusters that
are being written to is changed to allocated. (See also unallocated space.)
Allocation Unit: In file systems an allocation unit is the smallest amount of disk space that can
be allocated to hold a file. All file systems used by Windows 2000 organize hard disks based on
allocation units. The smaller the allocation unit size, the more efficiently a disk stores
information. If no allocation unit size is specified during formatting, Windows 2000 chooses
default sizes based on the size of the volume and the file system used. These defaults are
selected to reduce the amount of space lost and the amount of fragmentation on the volume.
Also called clusters.
ASL: Short for "age, sex, location," a common greeting when entering certain chat rooms
online.
Basic input/output system (BIOS): The set of essential software routines that tests hardware at
startup, assists with starting the operating system, and supports the transfer of data among
hardware devices. The BIOS is stored in read-only memory (ROM) so that it can be executed
when the computer is turned on. Although critical to performance, the BIOS is usually invisible
to computer users.
Bit: A measurement of data. It is the smallest unit of data. A bit is either the "1" or "0."
Bit-for-bit copy: A method of copying the information stored on electronic media so that it
replicates the data at the lowest level. The term bit copy refers to the duplication of the 0s and
1s (bits) that form the basis of all digital information. This type of copying is utilized to create
the true and accurate copy analyzed by the forensic examiner.
Bluetooth: A network technology for very small, so-called Personal Area Networks (PANs), with
a geographic scope of 1-100 m. Commonly used to enable communication between mobile
devices, such as a cell phone and external headset. Can also be used for file transfer. NOTE:
Bluetooth (BT) devices communicate with each other in a pair-wise fashion; BT must be enabled
on both devices, the devices must both be in discoverable mode, and permission set on both
devices to accept the communication.
Byte: Eight bits. The byte is the basis for measurement of most computer data as multiples of
the byte value. A kilobyte (KB) is nominally one thousand bytes or eight thousand bits; more
2
precisely, it is 210 = 1,024 bytes because units of computer storage are based on powers of 2
rather than powers of 10. Similarly, a megabyte (MB) is approximately one million bytes (it is
actually 220 = 1,048,576 bytes, or 1,024 KB). A gigabyte (GB) is roughly one billion bytes (230 =
1,073,741,824 bytes); 1 GB = 1,024 MB. A terabyte (TB) is approximately one trillion bytes (240 =
1,099,511,627,776 bytes); 1 TB = 1,024 GB. Because these units are based on powers of 2, a
new nomenclature is emerging, where a kilobyte, megabyte, gigabyte, and terabyte are
denoted KiB, MiB, GiB, and TiB, respectively.
Cache: A type a computer memory that temporarily stores frequently used information for
quick access or a storage location on a computer hard drive for temporary files (e.g., Internet
cache).
Carving: One method of recovering deleted data from the unallocated space or slack space of
computer media. Many specialized file types, such as graphical images, have a file signature
that identifies the file contents and format. When a file is "deleted," the contents of the file
remain intact, although the file location on the media becomes marked as unallocated and,
therefore, invisible to the operating system. Forensics tools can search unallocated and slack
space for known file signatures and, in many cases, can recover the files completely intact.
Central Processing Unit (CPU): The most powerful chip in the computer; located inside a
computer, it is the "brain" that performs all arithmetic, logic, and control functions (most
common processors are made by Intel, AMD, and Motorola).
Code Division Multiple Access (CDMA): One of the digital cellular phone technologies and the
one most widely employed in North America.
Compact Disc (CD): Data storage medium with a capacity of approximatly 650 MB; can store
about 1,500 floppy disks worth of data. Also known as a CD-ROM (read-only memory).
Cookie: Small data files written to a user's hard drive by a Web browser with information from
a Web site. These files contain specific information that identifies users (e.g., passwords and
lists of pages visited).
Chat Log: Computer files, usually stored on an individual's computer, that contain the content
from online chat sessions. These logs can include the dates and times of communications, file
transfers, and the text of the communication.
Cluster: (See Allocation Unit)
Defragmentation: The process of rewriting parts of a file to contiguous sectors on a hard disk to
increase the speed of access and retrieval. When files are updated, the computer tends to save
these updates on the largest continuous space on the hard disk, which is often on a different
sector than the other parts of the file. When files are thus fragmented, the computer must
search the hard disk each time the file is opened to find all of the parts of the file, which slows
3
down response time. In Active Directory, defragmentation rearranges how the data is written in
the directory database file to compact it. See also fragmentation.
Deleted data: Deleted data is data that formerly existed on the computer as live data and
which has been deleted by the computer system or end-user activity. Deleted data remains on
storage media in whole or in part until it is overwritten by ongoing usage or wiped with a
software program specifically designed to remove deleted data. After data has been deleted,
directory entries, pointers, or other metadata relating to the deleted data may remain on the
drive; wiped data is usually beyond the reach of most computer forensics processes.
Digital forensic evidence: Information stored or transmitted in binary form that may be relied
on in court.
Digital versatile disc (DVD): A type of optical storage media, a DVD looks like a CD-ROM and
can store up to approximate 8 GB. DVDs are often used to store full-length movies and other
multimedia content that requires large amounts of storage space.
Directory structure: Organization of directories (aka folders) and files on a hard drive, like the
branches of an upside down tree. The main directory is called the root directory, denoted "\"
on a Windows system or "/" on a Linux/Unix system.
Electronic storage device: Any medium that is used to record information, including hard disks,
magnetic tapes, compact disks, videotapes, audiotapes, and removable storage devices such as
floppy disks and ZIP disks.
Enhanced Message Service (EMS): An extension of SMS that allows multimedia exchange of
pictures, videos, etc.
Electronic Serial Number (ESN): A 32-bit numeric identifier assigned to CDMA and TDMA
phones. Can be expressed in decimal or hexadecimal; in the latter case, it is often preceded by
a "0x". (See also MEID.)
Faraday box (or bag): As with flight mode, a Faraday box ensures that a mobile device is
isolated from the network. If flight mode is not available on a phone, a Faraday box is another
option to secure the phone from receiving incoming network signals.
File: A collection of data of information stored under a specified name on a disk.
File allocation table (FAT): A file system based on a file allocation table (FAT) maintained by
some operating systems, including Windows NT and Windows 2000, to keep track of the status
of various segments of disk space used for file storage. The FAT file system is also commonly
seen on floppy disks, thumb drives, and memory expansion cards.
File extension: In the Windows operating system, the file extension is a tag of three or four
characters, preceded by a dot, that identifies a file's format or the application used to create
the file. File extensions can streamline the process of locating data; e.g., if one is looking for
4
incriminating pictures stored on a computer, one might begin with .GIF and .JPG files. File
extensions can be changed by a user, however, and cannot be the definitive method with which
to identify the file type and content. (See file signature.)
File signature: A string of bytes within a file that definitively identifies the file format and
application. A file signature is a better indication of file type than file extension.
File slack: Space between the logical end of the file and the end of the last allocation unit for
that file; the unused portion of a file between the end of the user data and the end of the last
cluster of the file.
Flight mode: Also known as airplane mode, an operational mode of a mobile phone where the
radio is turned off, thus allowing the user to access all features of the phone except the ability
to place and receive calls. This is ideal for investigations and analysis because the phone is
isolated from the network.
Floppy disk: An increasingly rare storage medium consisting of a thin magnetic film disk housed
in a protective sleeve. The capacity of a 3.5" floppy is approximately 1.44 MB.
Fragmentation: The scattering of parts of the same file over different areas of the disk.
Fragmentation occurs as files on a disk are deleted and new files are added. It slows disk access
and degrades the overall performance of disk operations, although usually not severely. See
defragmentation.
Global System for Mobile communications (GSM): A TDMA technology used for cellular
telephones. GSM is in growing use in North America and widely used throughout the rest of the
world.
Globally Unique Identifier (GUID): A 16-byte value generated from the unique identifier on a
device, the current date and time, and a sequence number. A GUID is used to identify a
particular device or component.
Graphic image formats: There are several common graphic image file formats:





Bitmap (BMP)
Graphics Interchange Format (GIF), developed by Compuserve
Joint Photographic Experts Group (JPEG) format, most commonly used for photographs;
JPEG files, in particular, contain metadata that indicate photographic timestamps,
camera-type, resolution, and more
Portable Network Graphics (PNG)
Tagged Image File Format (TIFF)
Hard disk: The common magnetic storage medium for computers of all shapes and sizes; laptop
computers commonly use a 2.5" drive and desktop computers commonly use a 3.5" drive. An
internal hard drive is one that is located inside the computer case using an IDE or SCSI
5
connector; an external hard drive connects to the computer via some sort of serial interface,
such as Firewire or USB. Hard drives can also be stand-alone devices on a wired or wireless
network. Common disk drive capacities today range from 160 GB (small notebook computers)
and 250 GB (laptop computers) to 320 GB (desktop computers) and 1 TB (external network
devices). Information on a hard drive remains on the disk even after the power is turned off.
Technically speaking, a hard drive refers specifically to the magnetic storage platters and a hard
disk drive is the mechanism that controls the positioning, reading, and writing of the
information on the hard disk; since they are packaged as a unit, these terms tends to be used
synonymously.
Hardware: The physical parts of a computer; if it can be picked up and touched, it is hardware
as opposed to software.
Hashing: The process of using a mathematical algorithm to produce a numeric digital
fingerprint of the contents of a file. Hash functions accept as input an arbitrarily long input
string and generates a fixed length output string. Changing the name of a file will not change
the hash value of the file (as long as the contents remain unchanged.) The two most common
hash functions used in digital forensics applications are Message Digest 5 (MD5) and the Secure
Hash Algorithm (SHA).
Header, e-mail: An e-mail header is the part of an e-mail message that contains identification
and routing information such as the sender, receiver, message identifier, chain of mail servers,
message priority, and other tags.
Hypertext Markup Language (HTML): The tag-based markup language used to create Web
pages. A browser (e.g., Firefox, Internet Explorer, or Safari) downloads an HTML file from a Web
server and renders the file contents into a nicely formatted page for the user.
Instant messaging: A type of communications service that enables one to create a kind of
private chat dialogue with another individual in order to communicate in real-time over the
Internet; instant messaging is analogous to a telephone conversation but is text-based rather
than voice-based. Typically, the instant message system alerts one whenever somebody on
one's private list is online. One can then initiate a chat session with that particular individual.
Examples of instant messaging services include AOL Instant Messenger, Microsoft Messenger,
Skype chat service, and Yahoo! Chat.
Instant Messenger (IM): The instant messaging service from America Online (AOL).
Integrated Digital Enhanced Network (iDEN): A Motorola-developed TDMA mobile
telecommunications technology. iDEN phones allow normal two-way telephone conversations
as well as a walkie-talkie capability.
International Mobile Equipment Identity (IMEI): A unique 56-bit numeric identifier assigned to
a GSM phone.
6
International Mobile Subscriber Identity (IMSI): A unique number that identifies a mobile
phone user.
Internet Protocol (IP) address: An IP version 4 (IPv4) address is a 32-bit number that uniquely
identifies a host connected to the Internet. An IP address is expressed in "dotted decimal"
format, consisting of the decimal value (0-255) of its four bytes, separated with periods; an
example IPv4 address is 207.32.187.12. IPv4 address are broken into a network identifier
(NETID) and host identifier (HOSTID); the NETID identifies the network on which the host
resides. IPv4 defines several so-called private addresses that can be used by an enterprise any
way they want (e.g., 10.0.0.0, 172.16.0.0-172.31.0.0, 192.168.0.0). IP version 6 (IPv6) addresses
are 128 bits in length.
Media storage devices: Magnetic and optical storage devices that include hard and floppy
disks, tapes, ZIP disks, thumb (aka flash) drives, memory expansion cards, CDs, and DVDs. These
storage devices are distinct from computer memory, which refers to temporary storage areas
within the computer. Unlike main memory, media storage devices retain data even when
power is turned off.
Message Digest 5 (MD5): A hash function that produces a 128-bit digital fingerprint of an input
file. Although some researchers have been able to produce multiple files with the same MD5
hash, MD5 is still acceptable for computer forensics applications. (See also hashing and Secure
Hash Algorithm.)
Metadata: Metadata is "data about data" and is information about a particular data set. System
metadata is information about the file itself, such as location on the disk, size, timestamps, file
sharing attributes, and file ownership. File metadata is data about the file contents and are
usually application-dependent, such as camera information (in JPEG files) and user information
(in Word files). Metadata is generally not reproduced in full form when a document is printed;
indeed, it is usually not easily visible by the user.
microSD: A format for removable flash memory card, adding between 64 MB and 8 GB of
additional memory to a device.
Mobile Device (or Directory) Number (MDN): The number that someone would dial to reach
this mobile phone; the equivalent to the phone number. Mobile phones also have a MIN. Prior
to wireless number portability, the MDN and MIN were the same.
Mobile Equipment Identifier (MEID): A 56-bit numeric identifier that is supposed to replace
ESNs in CDMA and TDMA phones.
Mobile Identification Number (MIN): A unique 10-digit number assigned by a carrier to the
physical phone handset. Designed for use in CDMA and TDMA networks.
7
Mobile Services Integrated Services Digital Network (MSISDN): A 15-digit globally unique
phone number associated with a cell phone. The MSISDN contains the country code (+1 in
North America), service provider identifier, and subscriber phone number. Designed for use
with SIM cards and GSM networks.
Modem (Modulator-demodulator): Originally, a piece of hardware that allows computers to
connect to the analog telephone network. A cable modem is a specialized device that allows a
computer to connect to a cable TV network.
Moving Picture Experts Group (MPEG): An international standard for compressing full motion
video. MPEG files frequently use the .MPEG or .MPG file extension.
MPEG-2: A standard for video compression and video file format. MPEG-2 offers video
resolutions of 720 x 480 and 128 x 720 at 60 frames per second, with full CD-quality audio.
MP3: Audio compressed in the MPEG1 Layer 3 format.
MP4: Video compressed in the MPEG1 Layer 4 format.
Multimedia Messaging Service (MMS): An extension to SMS that allows small multimedia
attachments to text messages, such as video clips and animations. See also EMS.
NTFS file system: A recoverable file system designed for use specifically with Windows NTbased operating systems (i.e., Windows NT, 2000, XP, Vista, and 7). NTFS supports file system
recovery, large storage media, and many advanced features compared with the FAT file system.
Operating system: The master control program that runs a computer; examples include Linux,
Mac OS X, Unix, and Windows. The OS provides the user interface (command line or graphical)
and defines the interaction between the computer hardware and software.
Page file: A hidden file in the Windows operating system (usually named pagefile.sys) that hold
parts of programs and data files that do not fit into physical memory. The page file and physical
memory support a virtual memory system, whereby the computer believes that it has more
physical memory than it actually has (e.g., the computer OS might have a memory address
space of 16 GB of memory even though it only physically has 4 GB of RAM; memory "contents"
in excess of 4 GB are written to pagefile.sys). The OS moves data from the page file to physical
memory, as needed, and moves data from memory to the page file to make room for new data.
Also called a swap file. See also random access memory (RAM).
Peer-to-peer (P2P): A distributed network architecture whereby network hosts share their
resources (such as processing power and storage capacity) with other hosts without the need
for a central managing device. Most Internet applications are client-server, whereby a host
(e.g., an e-mail or Web user) obtains a service from another host (e.g., an e-mail or Web
server). In a P2P environment, hosts communicate directly without the need of a server. The
most common P2P application is file sharing, using software such as FastTrack, Gnutella, and
Kazaa. Skype is a P2P application for chat, file sharing, and voice communication.
8
Peripherals: Ancillary devices that are not "essential" parts of the computer itself. Peripheral
devices can be outside of the computer (i.e., external such as a mouse, keyboard, printer,
monitor, camera, external hard drive, or scanner) or inside the computer case (i.e., internal
such as a CD-ROM drive, internal modem, or floppy disk drive).
Personal Identification Number (PIN): A numeric password that can be used to protect access
to a cell phone and/or SIM card.
Personal Unblocking Key (PUK): A numeric password that can unlock the PIN. This is obtained
from the service provider.
PTHC: Short for "preteen hardcore" or child pornography. Used mostly on peer-to-peer (P2P)
programs such as Kazaa.
Random Access Memory (RAM): Short-term, physical memory used by the computer processor
to store program instructions and data. Information stored in RAM is lost when the computer is
turned off. RAM today commonly range in capacity from 1 GB to 8 GB (more RAM means less
swapping of information and, therefore, faster processing; see Page file). Because RAM might
contain user names and passwords, it is becoming more common to image RAM prior to
shutting a computer off. Contrast with Read Only Memory (ROM).
R@ygold: A codename used by pedophiles so that they can easily locate each other's media.
R@ygold is a keyword added to image and video files with illegal child pornographic content, so
that those dealing in child porn can locate and share files over P2P networks.
Read-only memory (ROM): A type of storage that, in general, can only be read from but not
written to. A computer's basic input/output system (BIOS) chip, for example, is a semiconductor
circuit that contains a small program that starts a computer and performs basic diagnostics. The
system reads the instructions in BIOS during the boot process but does not write to BIOS. (A
special process, called flashing, can be employed to re-write instructions to BIOS for purposes
of updating, but normal operations merely read.) A CD-ROM is a media device that allows only
a single write; all subsequent access to a CD-ROM is for reading. Contrast with Random Access
Memory (RAM).
Registry: In Windows 95 and later versions, the registry is a database of information about the
computer's hardware and software configuration, including user profile and usage information.
The registry was intended to consolidate all of the individual initialization (.INI) files associated
with the operating system and user applications. The registry is organized in a hierarchical
structure and consists of subtrees and their keys, hives, and entries.
Router: On the Internet, a router is a network backbone device responsible for forwarding
Internet Protocol (IP) packets from the sender to the receiver. At a company, a router is the
gateway between the corporate network and the greater Internet. A residential broadband
router provides essentially the same service -- i.e., acting as a gateway between the home
network and Internet -- but also usually incorporates additional functions such as a switch
9
(allowing multiple computers to physically connect to the router and each other, forming a
home local area network) or wireless access point (allowing multiple computers to access the
router via radio).
Screen capture: Refers to the act of copying what is currently displayed on a screen to a file or
printer. Screen capture can be performed using functions on the computer, which generally
create a graphical file containing a bit map of the screen image, or by taking photographs of the
screen. Screen captures can be accomplished by a series of one or more photographs or video
capture.
Secure Hash Algorithm (SHA): Developed by the National Institute of Standards and
Technology (NIST), a hash function that produces a 160-bit digital fingerprint of an input file.
(See also hashing and Message Digest 5.)
Short Message Service (SMS): The protocol for cell phone (and Twitter!) text messages. SMS
messages are limited to 1,120 bits, or 160 7-bit (ASCII) characters, 140 8-bit (ASCII) characters,
or 70 16-bit (Unicode) characters.
Small Computer System Interface (SCSI): A standard high-speed parallel interface defined by
the American National Standards Institute (ANSI). A SCSI interface is used to connect
microcomputers to SCSI peripheral devices, such as many hard disks and printers, and to other
computers and local area networks.
Software: The programs that allow users to perform tasks on a computer, such as word
processing, media players, graphics editing, accounting systems, games, and more. The
computer's operating system is also software. Also known as applications and executables.
Subscriber Identity Module (SIM): A smart card that provides storage and other features for
some types of cell phones, such as contact names and SMS messages (sometimes including
deleted SMS messages). Always found in GSM and iDEN phones.
Thumbs.db: On Windows systems, a small database of cached thumbnail images of any image
or movie file in a folder. Creating a thumbnail cache improves the speed of displaying
thumbnails the next time a folder is opened; this file is created automatically by the operating
system.
Time Division Multiple Access (TDMA): One of the digital cellular phone technologies. TDMA
phones, per se, are seeing less and less use in North America although TDMA is the underlying
technology used in GSM and iDEN phones.
Unallocated space: The clusters on a storage device that are not assigned to store data. When a
file is written to a drive, the clusters storing the data are marked as "allocated." When the file is
deleted, the clusters are merely marked as "unallocated" but the contents of those clusters
remains untouched; this is why deleted data can often be recovered. If a file is wiped, the
10
clusters are marked unallocated and the clusters are overwritten with other information,
making the data effectively unrecoverable. (See also allocated space.)
Universal Serial Bus (USB): A serial bus for connecting peripherals to a microcomputer. USB can
connect up to 127 peripherals, such as external CD-ROM drives, printers, modems, thumb
drives, and keyboards, to the system through a single, general-purpose port. This is
accomplished by daisy chaining peripherals together. USB supports hot plugging and multiple
data streams.
USB power: The Universal Serial Bus port on most computers is able to supply a low amount of
power to an attached device. In some cases, a cell phone or other mobile device can be charged
by connecting a compatible phone plug to a computer's USB port.
WAV: An audio storage file type, developed by Microsoft. An alterative to MP3.
Wideband Code Division Multiple Access (WCDMA): A newer, third generation (3G) mobile
device technology for voice and data. WCMDA is not compatible with CDMA.
Download