Digital Forensics Flashcards
Hardware
physical and tangible components of the computer
Software
set of instructions compiled into a program that performs a particular task
Computer case/Chassis
physical box holding the fixed internal computer components in place
Power Supply
converts the power it gets from the wall outlet to a useable format for the computer and its components
Motherboard
main circuit board contained within a computer
System Bus
vast complex network of wires that serves to carry data from one hardware device to another`
CPU
brains of the computer
RAM
not permanent; its contents undergo constant change and are forever lost once power is taken away from the computer
ROM
stores data long term
Hard Disk Drive
primary location of data storage within the computer
Sectors are typically _____ bytes in size
512
Clusters
groups of sectors
Tracks
concentric circles that are defined around the platter, made up of clusters
Cylinders
groups of tracks that reside directly above and below each other
Data Product Files
basic software programs and files found on most computers
Orphaned File
a file that may be recoverable from a previous file version
Unsaved File
a document can be typed and not saved, yet may still be recoverable because a temporary file was created
Print Spool File
a process delays the information being sent to a printer during a print job so that the active application can continue working during the printing process
Swap File Data
applications may be swapped out of RAM and written to the swap file on the hard drive disk
Hex editor
application that allows data to read on the binary level without having to use the operating system’s file system table
Slack Space
empty space on the hard drive
Unallocated space
space not technically used on a hard drive
IP Address
a digital address assigned to a user by their internet service provider
Cookies
website information, placed on the hard drive to track information about a user’s activity, specific to a website
Internet Cache
used to store portions of web-pages on the hard drive to make revisiting them quicker, more effective, and to conserve bandwidth
Fraud
Identity theft, auction, bank, phishing, spoofing, money laundering, hacking
Terrorism
Attacks on networks as a social and/or political objective, fear propaganda, hacking
Imaging
data acquisition process
Triangulation
used to locate a mobile device based on the signal from multiple cellular towers
Peer-to-peer
method to verify that a digital device has been completely and correctly collected
A unique feature of digital evidence is that it can be _______
perfectly copied
How a file is stored depends greatly on the ____ in use
OS
The digital device tracking method based on satellites is known as ______
GPS
Cell phones should be packaged in a ______________ in order to prevent them sending or receiving wireless signals.
faraday cage
A wife believes that her husband has been carrying on an illicit affair, and deleting any text messages he receives from his side chick. What method should an investigator use to recover these messages?
Targeted
For data stored as flash memory, what represents the 1s and 0s of the binary code?
Charge conducted by a floating gate
A few years ago, Target suffered a huge data breach when credit & debit card information was captured in real time as people swiped their cards. This suggest that which type of memory was targeted for collection by the criminals?
RAM
You accidentally delete your lovingly crafted 10 page term paper from a USB drive and plugged it into a different computer. What is your best bet for recovery?
Restore the file directory system
What information is captured by a SIM card?
The account information for a network subscriber
Magnetic Storage
Tiny magnet filings coat a platter
An electromagnetic head orients the filings up or down
Optical memory depends
On size and spacing
Flash memory
No moving parts
Data is not stored in a physically accessible way