Computer Forensics Review Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary and concepts from the Computer Forensics lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

Computer Forensics

The preservation, acquisition, extraction, and interpretation of computer data.

2
New cards

Hardware

The physical and tangible components of a computer.

3
New cards

Software

A set of instructions compiled into a program that performs a specific task.

4
New cards

Read-Only Memory (ROM)

A type of memory that stores firmware used to start the boot process.

5
New cards

Random Access Memory (RAM)

Volatile memory that temporarily stores data needed at a moment's notice.

6
New cards

Central Processing Unit (CPU)

The main processing unit of a computer, often referred to as the processor.

7
New cards

Hard Disk Drive (HDD)

The primary location of data storage within a computer.

8
New cards

Visible Data

Data that the operating system is aware of and easily accessible to the user.

9
New cards

Latent Data

Data of which the operating system is not aware, often left behind after deletion or other processes.

10
New cards

File Allocation Table (FAT)

A table that keeps track of the location of files and folders on an HDD.

11
New cards

Master File Table (MFT)

A component of the NTFS partition that keeps track of filesystem data.

12
New cards

Partitioning

The process of dividing an HDD into separate sections for data management.

13
New cards

Swap Space

An area on the hard drive used to conserve RAM by temporarily holding data.

14
New cards

Evidence Types

Can be categorized into visible or latent data.

15
New cards

Internet Cache

A temporary storage area for frequently accessed web data.

16
New cards

IP Address

A unique address assigned to each computer on a network, generally in the form ###.###.###.###.

17
New cards

Forensic Image Acquisition

The process of obtaining a copy of data from a storage device without altering it.

18
New cards

Computer Fingerprint

A unique alphanumeric string generated to verify the integrity of data on a drive.

19
New cards

Firewall

A network security device designed to monitor and control incoming and outgoing network traffic.