image

Glossary of Key Terms

A

American Standard Code for Information Interchange (ASCII)

A set of codes defining all the various keystrokes you could make, including letters, numbers, characters, and even the spacebar and return keys.

Anonymous remailing

The process of sending an email message to an anonymizer. The anonymizer strips identifying information from an email message before forwarding it with the anonymous mailing computer’s IP address.

Anti-forensics

The actions that perpetrators take to conceal their locations, activities, or identities.

Asymmetric cryptography

Cryptography wherein two keys are used: one to encrypt the message and another to decrypt it.

B

Base transceiver station (BTS)

The part of the cell network responsible for communications between the mobile phone and the network switching system.

Basic input/output system (BIOS)

The basic instructions stored on a chip for booting up the computer.

Bit-level information

Information at the level of actual 1s and 0s stored in memory or on the storage device.

Block cipher

A form of cryptography that encrypts data in blocks; 64-bit blocks are quite common, although some algorithms (like AES) use larger blocks.

Bootstrap environment

A special program, such as U-Boot or RedBoot, that is stored in a special section of the flash memory.

Brute-force attack

An attack in which the attacker tries to decrypt a message by simply applying every possible key in the keyspace.

Business continuity plan (BCP)

A plan for maintaining minimal operations until the business can return to full normal operations.

Business impact analysis (BIA)

An analysis of how specific incidents might impact the business operations.

C

Caesar cipher

The method of cryptography in which someone chooses a number by which to shift each letter of a text in the alphabet and substitute the new letter for the letter being encrypted. For example, if your text is “A CAT,” and you choose to shift by two letters, your encrypted text is “C ECV.” This is also known as a monoalphabet, single-alphabet, or substitution cipher.

Carrier

The signal, stream, or data file into which the payload is hidden.

Cell-phone forensics

The process of searching the contents of cell phones.

Chain of custody

The continuity of control of evidence that makes it possible to account for all that has happened to evidence between its original collection and its appearance in court, preferably unaltered.

Channel

The type of medium used to hide data in steganography. This may be photos, video, sound files, or Voice over IP.

Clean room

An environment that has a controlled level of contamination, such as from dust, microbes, and other particles.

Cloud computing

The practice of delivering hosted services over the Internet. This can be software as a service, platform as a service, or infrastructure as a service.

Computer forensics

The use of analytical and investigative techniques to identify, collect, examine, and preserve computer-based material for presentation as evidence in a court of law.

Consistency checking

A technique for file system repair that involves scanning a disk’s logical structure and ensuring that it is consistent with its specification.

Cryptanalysis

A method of using techniques other than brute force to derive a cryptographic key.

Curriculum vitae (CV)

An extensive document expounding one’s experience and qualifications for a position, similar to a résumé but with more detail. In academia and expert work, a CV is usually used rather than a résumé.

Cyberstalking

The use of electronic communications to harass or threaten another person.

D

Data consistency

The act of ensuring the data that is extracted is consistent.

Daubert standard

The standard holding that only methods and tools widely accepted in the scientific community can be used in court.

Demonstrative evidence

Information that helps explain other evidence. An example is a chart that explains a technical concept to the judge and jury.

Denial of service (DoS) attack

An attack designed to overwhelm the target system so it can no longer reply to legitimate requests for connection.

Digital evidence

Information that has been processed and assembled so that it is relevant to an investigation and supports a specific finding or determination.

Disaster recovery plan (DRP)

A plan for returning the business to full normal operations.

Disk forensics

The process of acquiring and analyzing information stored on physical storage media, such as computer hard drives or smartphones.

Disk Operating System (DOS)

A command-line operating system.

Distributed denial of service (DDoS) attack

An attack in which the attacker seeks to infect several machines, and use those machines to overwhelm the target system to achieve a denial of service.

Documentary evidence

Data stored in written form, on paper or in electronic files, such as email messages and telephone call-detail records. Investigators must authenticate documentary evidence.

Dump

A complete copy of every bit of memory or cache recorded in permanent storage or printed on paper.

E

Electronic serial number (ESN)

A unique identification number developed by the U.S. Federal Communications Commission (FCC) to identify cell phones.

Email forensics

The study of the source and content of email as evidence, including the identification of the sender, recipient, date, time, and origination location of an email message.

Enhanced Data Rates for GSM Evolution (EDGE)

A technology that does not fit neatly into the 2G/3G/4G spectrum. It is technically considered pre-3G but was an improvement on GSM (2G).

Euler’s Totient

The total number of coprime numbers. Two numbers are considered coprime if they have no common factors.

Expert report

A formal document prepared by a forensics specialist to document an investigation, including a list of all tests conducted as well as the specialist’s own curriculum vitae (CV). Anything the specialist plans to testify about at a trial must be included in the expert report.

Expert testimony

The testimony of an expert witness, one who testifies on the basis of scientific or technical knowledge relevant to a case, rather than personal experience.

F

Feistel function

A cryptographic function that splits blocks of data into two parts. It is one of the most influential developments in symmetric block ciphers.

File slack

The unused space between the logical end of file and the physical end of file. It is also called slack space.

Foreign Intelligence Surveillance Act of 1978 (FISA)

A U.S. law that prescribes procedures for the physical and electronic surveillance and collection of “foreign intelligence information” between foreign powers and agents of foreign powers, which may include U.S. citizens and permanent residents suspected of espionage or terrorism.

Fraud

A broad category of crime that can encompass many different activities, but essentially, any attempt to gain financial reward through deception.

G

Global System for Mobile (GSM) communications

A standard developed by the European Telecommunications Standards Institute (ETSI). Basically, GSM is the 2G network.

Graphical user interface (GUI)

A point-and-click user interface.

grep

A popular Linux/UNIX search tool.

GRUB (Grand Unified Bootloader)

A newer Linux boot loader.

H

Hash

A function that is nonreversible, takes variable-length input, produces fixed-length output, and has few or no collisions.

Heap (H)

Dynamic memory for a program comes from the heap segment. A process may use a memory allocator such as malloc to request dynamic memory.

Hierarchical storage management (HSM)

Continuous online backup storage.

Hive

One of the five sections of the Windows Registry.

Home location register (HLR)

The database used by the MSC for subscriber data and service information.

I

Identity theft

Any use of another person’s identity.

Inode

A data structure in the file system that stores all the information about a file except its name and its actual data.

Integrated Circuit Card Identifier (ICCID)

A unique serial number that identifies each SIM. These numbers are engraved on the SIM during manufacturing.

International Mobile Equipment Identity (IMEI) number

A unique number identifying GSM, LTE, and other types of phones. The first 8 bits of the ESN identify the manufacturer, and the subsequent 24 bits uniquely identify the phone.

Internet forensics

The process of piecing together where and when a user has been on the Internet.

Internet Message Access Protocol (IMAP)

A protocol used to receive email that works on port 143.

Intrusion detection system

A system that monitors network traffic looking for suspicious activity.

ISO9660

A file system used with CDs.

K

Kasiski examination

A method of attacking polyalphabetic substitution ciphers by deducing the length of the keyword. This is sometimes also called Kasiski’s test or Kasiski’s method.

Keyspace

The total number of keys.

L

Least significant bit (LSB)

The last bit or least significant bit is used to store data.

Life span

A term that refers to how long data will last. The term is related to volatility. More volatile data tends to have a shorter life span.

LILO (Linux Loader)

One of the Linux boot loaders.

Live system forensics

The process of searching memory in real time, typically for working with compromised hosts or to identify system abuse.

Logical analysis

Analysis involving using the native operating system, on the evidence disk or a forensic duplicate, to peruse the data.

Logical damage

Damage to how the data is stored—for example, file system corruption.

Logic bomb

Malware that executes its damage when a specific condition is met.

Long Term Evolution (LTE)

A standard for wireless communication of high-speed data for mobile devices. This is what is commonly called 4G.

M

Master boot record (MBR)

The record on the hard drive partition used to initiate booting that partition.

Maximum tolerable downtime (MTD)

The length of time a system can be down before the business cannot recover.

Mean time before failure (MTBF)

The average length of time before a given piece of equipment will fail through normal use.

Mean time to repair (MTTF)

The average time needed to repair a given piece of equipment.

Mobile switching center (MSC)

A switching system for a cellular network.

Moore’s law

The observation by Gordon Moore of Intel Corporation that capacity would double and price would be cut in half roughly every 18 to 24 months for products based on computer chips and related technology.

Multiple-input multiple-output (MIMO)

The wireless technology that uses multiple antennas to coherently resolve more information than possible using a single antenna.

N

Network forensics

The process of examining network traffic, including transaction logs and real-time monitoring.

P

Payload

The data to be covertly communicated. In other words, it is the message you want to hide.

Personal identification number (PIN)

An ID number for a cell phone user.

Personal unlocking code (PUK)

A number for unlocking a cell phone.

Physical analysis

Offline analysis conducted on an evidence disk or forensic duplicate after booting from a CD or another system.

Physical damage

Damage to actual hard drive parts; for example, a damaged platter or spindle.

Post Office Protocol version 3 (POP3)

A protocol used to receive email that works on port 110.

Power-on self test (POST)

This is a brief hardware test the BIOS performs upon boot-up.

Protected computer

Any computer at a financial institution of any kind or a government agency.

R

Rainbow table

Type of password crackers that work with precalculated hashes of all passwords available within a certain character space.

Real evidence

Physical objects that can be touched, held, or directly observed, such as a laptop with a suspect’s fingerprints on it or a handwritten note.

Routing table

A table used with routers to track what IP addresses are connected to ports on the router.

Rules of evidence

Rules that govern whether, when, how, and why proof of a legal case can be placed before a judge or jury.

S

Scrubber

Software that cleans unallocated space. Also called a sweeper.

Simple Mail Transfer Protocol (SMTP)

A protocol used to send email that works on port 25.

Slack space

The unused space between the logical end of file and the physical end of file. It is also called file slack.

Slurred image

The result of acquiring a file as it is being updated.

Sniffer

The computer software or hardware that can intercept and log traffic passing over a digital network.

Social engineering

Nontechnical means of obtaining information you would not normally have access to.

Software forensics

The process of examining malicious computer code.

Spoofing

The act of making an email message appear to come from someone or someplace other than the real sender or location.

Stack (S)

Memory is allocated based on the last-in, first-out (LIFO) principle.

Steganalysis

The determination of whether a file or communication hides other information.

Steganography

The art and science of writing hidden messages.

Steganophony

The use of steganography with sound files.

Stream cipher

A form of cryptography that encrypts the data as a stream, one bit at a time.

Subscriber Identity Module (SIM)

A card that identifies a phone with a user and a number.

Substitution

In cryptography, the method of changing some part of the plaintext for some matching part of ciphertext.

Sweeper

A kind of software that cleans unallocated space. Also called a scrubber.

Symmetric cryptography

Those methods where the same key is used to encrypt and decrypt the plaintext.

T

Temporary data

Data that an operating system creates and overwrites without the computer user taking a direct action to save this data.

Testimonial evidence

Information that forensic specialists use to support or interpret real or documentary evidence; for example, to demonstrate that the fingerprints found on a keyboard are those of a specific individual.

Test system

A functional system compatible with the hard drive from which someone is trying to recover data.

Three-way handshake

The process of connecting to a server that involves three packets being exchanged.

Transposition

In terms of cryptography, this is the swapping of blocks of ciphertext.

U

Unallocated space

Free space, or the area of a hard drive that has never been allocated for file storage.

Unicode

The international standard for information encoding.

Universal Disk Format (UDF)

A file system used with DVDs.

Universal Mobile Telecommunications System (UMTS)

A 3G standard based on GSM.

USA Patriot Act of 2001

An act passed into law as a response to the terrorist attacks of September 11, 2001, that significantly reduced restrictions on law enforcement agencies’ gathering of intelligence within the United States; expanded the Secretary of the Treasury’s authority to regulate financial transactions, particularly those involving foreign individuals and entities; and broadened the discretion of law enforcement and immigration authorities in detaining and/or deporting immigrants suspected of terrorism and related acts.

V

Vigenère cipher

A method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected based on the letters of a keyword. A polyalphabetic cipher.

Virus

Any software that self-replicates.

Visitor location register (VLR)

A database used by the MSC for roaming phones.

Volatile data

Data that changes rapidly and may be lost when the machine that holds it is powered down.

Volatile memory

Computer memory that requires power to maintain the data it holds, and can be changed. RAM is highly volatile; EEPROM is very nonvolatile.

Volatile memory analysis

A live system forensic technique in which you collect a memory dump and perform analysis in an isolated environment.

Z

Zero-knowledge analysis

A technique for file system repair that involves recovering data from a damaged partition with limited knowledge of the file system.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.140.186.201