Prelims Flashcards
are tools and techniques that frustrate forensic tools, investigations, and investigators / the attempt to limit the identification, collection, collation, and validation of electronic data / techniques to avoid detection or hiding of system intrusion
Anti - forensics
is a model for enabling ubiquitous, convenient, on-demand network access to shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction; this model enables customers to be in control of their computing resource needs and add computing resources as they wish througha highly automated and responsive set of processes.
Cloud Computing
referstoanelectronic,magnetic,optical,electrochemical,orotherdataprocessing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage facility, or equipment or communications facility or equipment directly to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks, and other devices connected to the Internet.
Computer
refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents / or electronic data messages whether stored in local computer systems or online.
Computer Data
refers to any device or group of interconnected or related devices,one or more of which, pursuant to a program, performs automated processing data. It covers anytype of device with data processing capabilities, including, but not limited to, computers andmobile phones. The device consisting of a hardware and software may include input, output,
and storage components, which may stand alone or be connected to a network or othersimilar devices. It also includes computer data storage devices or media.
Computer System
is the application of scientific principles to the process of discovering information from a digital device which includes computers, printers, cell phones, mobile devices, global positioning systems (GPSs), storage media, automobile systems and other programmable devices.
Digital Forensics
is part of a unit, often called a “disk drive”, “hard drive”, or “hard disk drive” that stores and provides relatively quick access to large amounts of data on an electromagnetically charged surface or set of surfaces. Data can be retrieved from existing files (even those that have been deleted, encrypted, or damaged) or by monitoring user activity in real time.
Hard Disk
refers to the physical components of a computer: case, keyboard, monitor, motherboard, RAM (random access memory), HDD (hard disk drive), etc.
Hardware
involvestheapplicationofscientificprinciplestotheprocessofdiscovering information from mobile devices which include cell phones, smartphones, and table devices.
Mobile Forensics
involves capturing, recording, and analysis of network events to discover source of security attack.
Network Forensics
focus of investigation, as compared to traditional digital forensics, is broader since one or more persons of interest may post information in any number of social media sites, using any number of social media technologies; also involves a degree of social network analysis in which organizational structures and key players are examined and identified.
Social Media Forensics
is a set of instructions compiled into a program that performs a particular task; consists of programs and applications that carry out a set of instructions on the hardware (e.g. operating systems like Windows, Linux, Mac OS, word-processing programs like Microsoft Word, web-browsing applications like Internet Explorer, Google Chrome.
Software
traditionally defined as any criminal act committed via computer; general term which included both Internet and non-Internet facilitated criminal activities
Computer Crime
a broad term used to encompass those criminal activities in which a computer was peripherally/incidentally involved
Computer-Related Crime
aspecifictermusedtorefertoanycriminalactivitywhichhasbeencommitted through, or facilitated by the Internet.
Cybercrime