Computer Forensics: Email & Social Media Investigations

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/8

flashcard set

Earn XP

Description and Tags

Vocabulary terms and forensic concepts derived from study questions on email and social media investigations.

Last updated 2:03 AM on 5/5/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

9 Terms

1
New cards

Two main environments

The settings in which emails are sent and received, with one environment specifically identified as being easier for investigators to trace.

2
New cards

Email header

A section of an email that contains routing and origin information used by investigators to trace communication.

3
New cards

Return path

A component of an email header that should not be relied upon by investigators because it can be altered by a suspect.

4
New cards

IP addresses

Unique digital identifiers that can be traced using specific Internet resources during a forensic investigation.

5
New cards

Circular logging

A logging mechanism that can affect email investigations by determining how long data is retained before being overwritten.

6
New cards

Deleted emails

The status of electronic messages that investigators must determine can be completely removed or if they persist on systems and servers.

7
New cards

Forensic tools

Specialized software or applications available for conducting email-specific digital investigations.

8
New cards

Digital artifacts

Common evidence or data remains that can be found on Social Media platforms according to Chapter 11.

9
New cards

Social Media servers

Server systems that require specific legal authorization for law enforcement to access, often presenting unique investigative challenges.