1/8
Vocabulary terms and forensic concepts derived from study questions on email and social media investigations.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Two main environments
The settings in which emails are sent and received, with one environment specifically identified as being easier for investigators to trace.
Email header
A section of an email that contains routing and origin information used by investigators to trace communication.
Return path
A component of an email header that should not be relied upon by investigators because it can be altered by a suspect.
IP addresses
Unique digital identifiers that can be traced using specific Internet resources during a forensic investigation.
Circular logging
A logging mechanism that can affect email investigations by determining how long data is retained before being overwritten.
Deleted emails
The status of electronic messages that investigators must determine can be completely removed or if they persist on systems and servers.
Forensic tools
Specialized software or applications available for conducting email-specific digital investigations.
Digital artifacts
Common evidence or data remains that can be found on Social Media platforms according to Chapter 11.
Social Media servers
Server systems that require specific legal authorization for law enforcement to access, often presenting unique investigative challenges.