chapter5

advertisement
Guide to Computer Forensics and Investigations, Third Edition
5-1
Key Terms
 4-mm DAT — Magnetic tapes that store about 4 GB of data, but like CD-Rs, are slow
to read and write data.
 Automated Fingerprint Identification Systems (AFIS) — A computerized system for
identifying fingerprints that’s connected to a central database; used to identify criminal
suspects and review thousands of fingerprint samples at high speed.
 computer-generated records — Data generated by a computer, such as system log
files or proxy server logs.
 computer-stored records — Digital files generated by a person, such as electronic
spreadsheets.
 covert surveillance — Observing people or places without being detected, often using
electronic equipment, such as video cameras or keystroke/screen capture programs.
 Cyclic Redundancy Check (CRC) — A mathematical algorithm that translates a file
into a unique hexadecimal value.
 digital evidence — Evidence consisting of information stored or transmitted in
electronic form.
 digital hash — A unique hexadecimal value that identifies a file.
 extensive-response field kit — A portable kit designed to process several computers
and a variety of operating systems at a crime or incident scene involving computers.
This kit should contain two or more types of software or hardware computer forensics
tools, such as extra storage drives.
 hazardous materials (HAZMAT) — Chemical, biological, or radiological substances
that can cause harm to people.
 initial-response field kit — A portable kit containing only the minimum tools needed
to perform disk acquisitions and preliminary forensic analysis in the field.
 innocent information — Data that doesn’t contribute to evidence of a crime or
violation.
 International Organization on Computer Evidence (IOCE) — A group that sets
standards for recovering, preserving, and examining digital evidence.
 keyed hash set — A value created by an encryption utility’s secret key.
 limiting phrase — Wording in a search warrant that limits the scope of a search for
evidence.
 low-level investigations — Corporate cases that require less effort than a major
criminal case.
 Message Digest 5 (MD5) — An algorithm that produces a hexadecimal value of a file
or storage media. Used to determine whether data has been changed.
 National Institute of Standards and Technology (NIST) — One of the governing
bodies responsible for setting standards for various U.S. industries.
 nonkeyed hash set — A unique hash number generated by a software tool and used to
identify files.
 person of interest — Someone who might be a suspect or someone with additional
knowledge that can provide enough evidence of probable cause for a search warrant or
arrest.
 plain view doctrine — When conducting a search and seizure, objects in plain view of
a law enforcement officer, who has the right to be in position to have that view, are
subject to seizure without a warrant and can be introduced as evidence.
Guide to Computer Forensics and Investigations, Third Edition
5-2
 probable cause — An indication that a crime has been committed, evidence of the
specific crime exists, and evidence for the specific crime exists at the place to be
searched.
 professional curiosity — The motivation for law enforcement and other professional
personnel to examine an incident or crime scene to see what happened.
 Scientific Working Group on Digital Evidence (SWGDE) — A group that sets
standards for recovering, preserving, and examining digital evidence.
 Secure Hash Algorithm version 1 (SHA-1) — A forensic hashing algorithm created
by NIST to determine whether data in a file or on storage media has been altered.
 sniffing — Detecting data transmissions to and from a suspect’s computer and a
network server to determine the type of data being transmitted over a network.
Download