Cengage Chapter 4 - Processing Crime and Incident Scenes Flashcards
A computerized system for identifying fingerprints that’s connected to a central database; used to identify criminal suspects and review thousands of fingerprint samples at high speed.
Automated Fingerprint Identification System (AFIS)
Data generated by a computer, such as system log files or proxy server logs.
computer-generated records
Digital files generated by a person, such as electronic spreadsheets.
computer-stored records
Observing people or places without being detected, often by using electronic equipment, such as video cameras or keystroke/screen capture programs.
covert surveillance
A mathematical algorithm that translates a file into a unique hexadecimal value.
Cyclic Redundancy Check (CRC)
Evidence consisting of information stored or transmitted in electronic form.
digital evidence
A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers. This kit should contain two or more types of software or hardware forensics tools, such as extra storage drives.
extensive-response field kit
A unique hexadecimal value that identifies a file or drive.
hash value
Chemical, biological, or radiological substances that can cause harm to people.
hazardous materials (HAZMAT)
A portable kit containing only the minimum tools needed to perform disk acquisitions and preliminary forensics analysis in the field.
initial-response field kit
Data that doesn’t contribute to evidence of a crime or violation.
innocent information
A value created by an encryption utility’s secret key.
keyed hash set
Wording in a search warrant that limits the scope of a search for evidence.
limiting phrase
Private-sector cases that require less investigative effort than a major criminal case.
low-level investigations
An algorithm that produces a hexadecimal value of a file or storage media. Used to determine whether data has been changed.
Message Digest 5 (MD5)