IS4670 CHAPTER 5 TERMS & DEFINITIONS Flashcards

1
Q
  • Data stored in the Windows swap file, unallocated space, and file slack. It includes e-mail fragments, word processing fragments, directory tree snapshots, and potentially almost anything that has occurred on the subject computer.
A

Ambient computer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Tools that are used to check that the output of a program is as expected, given certain inputs. These tools do not actually examine the program being executed
A

Black-box system forensics software tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • The process of encoding information with fewer bits than the un-encoded information would use.
A

Compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Two Internet Protocol (IP) addresses that are communicating with each other, as well as two port numbers that identify the protocol or service.
A

Connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • The department of the U.S. federal government that coordinates and supervises agencies and functions of the government related to national security and the U.S. armed forces.
A

Department of Defense (DoD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • A U.S. federal government agency that sets standards for digital evidence processing, analysis, and diagnostics. It is involved with DoD investigations that require computer forensic support to detect, enhance, or recover digital media.
A

DoD Cyber Crime Center (DC3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • A form of fragmentation that pertains to any space left over between the last byte of the file and the first byte of the next cluster. This is a source of potential security leaks involving pass- words, network logons, e-mail, database entries, and word processing documents.
A

File slack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • A set of hardware and software components that protect system resources from attack by intercepting and checking network traffic.
A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • A computer memory chip or card that retains its data without being connected to a power source.
A

Flash memory media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • A tool used to identify unknown strings of text by searching for values between “completely true” and “completely false.”
A

Fuzzy logic tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • An interface for issuing commands to a computer using a pointing device (mouse) that manipulates and activates graphical images on a monitor.
A

Graphical user interface (GUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • A data collection process that involves creating a replica system and luring the attacker into it for further monitoring.
A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • An area on a hard drive where data can be hidden. The HPA was designed as an area where computer vendors could store data that is protected from user activities and operating system utilities, such as delete and format.
A

Host protected area (HPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • A hacking process by which iPhone firmware is overwritten to install third-party applications or unlock the device. This process makes modifications to the user data partition and is therefore forensically unsound.
A

Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • On a drive that uses a DOS partition, a reserved space at the beginning of the drive. It often contains the boot code needed to start loading the operating system; and contains 62 sectors of empty space where data can be hidden.
A

Master boot record (MBR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • A widely used encryption program for protecting the privacy of e-mail and other computer files. It uses two keys and a NIST-certified algorithm; and makes encrypted data practically impossible to decipher without the appropriate key.
A

Pretty Good Privacy (PGP)

17
Q
  • A form of encryption that uses a pair of cryptographic keys: one public, the other private. This is freely distributed and is used to encrypt the information to be sent. The recipient holds the private key and uses it to decrypt the received information.
A

Public-key cryptography

18
Q
  • The unused portion of the hard drive that is not allocated to any volume. It is also called free space.
A

Unallocated space

19
Q
  • The space that is left on a hard drive or disk when a file is deleted. The computer considers that space unused and available for reuse.
A

Unused space