Guide to Computer Forensics and Investigations

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts, vocabulary, and principles related to computer forensics and digital evidence processing.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Digital Evidence

Any information stored or transmitted in digital form that U.S. courts accept as physical evidence.

2
New cards

Evidence Collection

Systematically collecting, preserving, and documenting evidence at private-sector or crime scenes.

3
New cards

Best Evidence Rule

To prove the content of a document, the original document is ordinarily required.

4
New cards

Plain View Doctrine

Allows for the seizure of objects falling in plain view by an officer with legal right to be in that position.

5
New cards

Probable Cause

Standard needed for law enforcement to obtain a search warrant.

6
New cards

Business-Record Exception

Permits the introduction of records of regularly conducted activity as evidence in court.

7
New cards

Cyclic Redundancy Check (CRC)

A mathematical algorithm to determine if a file's contents have changed.

8
New cards

Message Digest 5 (MD5)

A hashing algorithm that generates a unique hexadecimal code value for files.

9
New cards

Hearsay

Secondhand or indirect evidence that is generally inadmissible in court.

10
New cards

Evidence Retention

Procedures to maintain and secure evidence for varying durations as required by law.

11
New cards

Digital Hash

A unique number generated to verify the integrity of a digital file or drive.

12
New cards

Data Acquisition

The process of collecting digital evidence from computer systems during an investigation.

13
New cards

Forensic Examination

A systematic process to uncover digital evidence and understand the context of the crime.

14
New cards

Chain of Custody

The process of maintaining and documenting evidence authenticity from collection to presentation in court.

15
New cards

Fourth Amendment

Part of the U.S. Constitution that protects against unreasonable searches and seizures.

16
New cards

RAID Systems

Redundant Array of Independent Disks, a data storage technology for data redundancy.

17
New cards

Covert Surveillance

Monitoring activities without knowledge of the subject, typically under strict corporate policy.