FRSC1030 Foundations of Forensic Science Chapter 20

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Adware

Malware that automatically generates online advertisements, where the advertisers pay the developer per view

2
New cards

Ancillary

Something that supports or helps activities or operations, such as a cellphone used to help track a suspect’s movements, but is not used to actually commit a crime. 

3
New cards

Backdoor

A program that bypasses authentication procedures to a network.

4
New cards

Black hats

Individuals who break into computer systems or networks with ill intent.

5
New cards

Cellular Network

The network of cells, the area around a cell tower.

6
New cards

Cloud

Storage locations that are not local to a personal or individual devices, such as Google Drive, Microsoft OneDrive, Apple iCloud, etc. Any file or photo stored in the cloud is stored in a location maintained by a company or entity.

7
New cards

Cybercrime

Crime committed using computers and over the Internet.

8
New cards

Digital evidence

Information stored electronically, such as digital images, videos, audio recordings, digital files, and software stored on devices such as computers, mobile phones, etc.

9
New cards

Hacker

A person who can overcome or disable computer security.

10
New cards

Hacking

Breaking into a secure or private computer or network, a form of trespassing. It is often the first step of cybercrime.

11
New cards

Hashing

A technique of copying files and information from one device to another, using an algorithm to create an output string unique to the original at the bit level of detail, commonly using the MD-5 algorithm.

12
New cards

Identity theft

One of the most common types of cybercrime, where a hacker gets into someone’s computer, where data such as passwords, bank account information, social security numbers, credit card data, or medical data can be copied and stolen to make fraudulent purchases, get loans, or steal money.

13
New cards

Imaging

The process of copying information from a device, using a bit-by-bit replicate of the actual device.

14
New cards

Intellectual property

Books, movies, and music stored in digital format.

15
New cards

Internet of Things (IoT)

16
New cards

Malware

Malicious software, such as a virus or a worm.

17
New cards

Operating system (OS)

The software needed to operate the device, such as iOS, Linux, Windows, etc.

18
New cards

Peer-to-peer (P2P)

A file-sharing protocol in which the connection between computers does not go through a central website or service, but links users directly. As a result, detecting the trafficking of the files becomes much more difficult.

19
New cards

Phishing

A technique to get a user to install malware on their device, where the user is sent an email or text that appears to come from a legitimate source.

20
New cards

Ransomware

Software that locks the screen of the user and threatens some type of extorsion if a fee is not paid.

21
New cards

Rootkits

Software that allows malware to stay hidden to the user.

22
New cards

Steganography

A technique where information or files are hidden within another file in an attempt to hide data.

23
New cards

Spyware

Malware that assesses what the computer user is doing on their device.

24
New cards

Triangulation

A method of determining the location of a phone at any given time, based on the strength of the signal received at a tower. Using three towers with known locations, analysts use the different signal strengths to create overlapping area circles, with their point of intersection being the location of the phone.

25
New cards

Trojan horse

Malware within a software application that is installed by a user that has some hidden destructive function activated when the application runs.

26
New cards

Virus

Malware that embeds itself into executable software to then spread to other executable files.

27
New cards

Voice over Internet protocol (VoIP)

Technology that allows voice communication to be transmitted over the internet instead of traditional phone lines, by converting analog voice signals into digital data packets that travel over IP networks, enabling calls from devices such as computers, mobile phones, etc.

28
New cards

White hats

Individuals who are tasked with testing computer security systems for vulnerabilities.

29
New cards

Worm

Malware that transmits itself over computer networks to infect other computers.

30
New cards

Write blocker

A hardware device placed between the evidence and the device to which the data is copied.