Recovering Graphics Files - Cyber Forensics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/92

flashcard set

Earn XP

Description and Tags

Flashcards covering graphics file formats, metadata, steganography, data compression, file recovery, and anti-forensic techniques.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

93 Terms

1
New cards

Bitmap Image

Collection of dots forming an image.

2
New cards

Vector Graphic

Image based on mathematical instructions.

3
New cards

Metafile Graphic

Combination of bitmap and vector graphics.

4
New cards

Bitmap Image

Grids of individual pixels.

5
New cards

Raster Image

Collection of pixels stored in rows.

6
New cards

Screen Resolution

Determines the amount of detail in an image.

7
New cards

Vector Graphics

Uses lines instead of dots to create images.

8
New cards

Metafile Graphics

Combines raster and vector graphics.

9
New cards

.png

Portable Network Graphic.

10
New cards

.gif

Graphic Interchange Format.

11
New cards

.jpeg/.jpg

Joint Photographic Experts Group.

12
New cards

.tiff/.tif

Tagged Image File Format.

13
New cards

.bmp

Windows Bitmap.

14
New cards

.hpgl

Hewlett Packard Graphics Language.

15
New cards

.dxf

Autocad.

16
New cards

Raw file format

Refers to a digital negative and is typically found on higher-end digital cameras.

17
New cards

Demosaicing

The process of converting raw picture data to another format.

18
New cards

Exchangeable Image File format (Exif)

Commonly used to store digital pictures; a standard for storing metadata in JPEG and TIF files.

19
New cards

Data compression

Coding data from a larger to a smaller form.

20
New cards

Lossless compression

Reduces file size without removing data.

21
New cards

Lossy compression

Permanently discards bits of information.

22
New cards

EOI Marker (FFD9)

The file marker for all JPEG files.

23
New cards

XIF file format

The first three bytes that are the same as a TIF file and are used to build a header search string.

24
New cards

Steganography

Practice of concealing a file within another file.

25
New cards

Steganography

Hides information inside image files.

26
New cards

Insertion Steganography

Hidden data is not displayed when viewing host file in its associated program.

27
New cards

Substitution Steganography

Replaces bits of the host file with other bits of data.

28
New cards

Steganalysis

Science of detecting the presence of hidden data in cover media files.

29
New cards

Error Level Analysis (ELA)

Shows inconsistencies in areas which may have been copy-pasted or cloned.

30
New cards

Host Protected Area (HPA) and Device Configuration Overlay (DCO)

One of the anti-forensic techniques used for data hiding, as well as the hidden areas on the HDD.

31
New cards

Image Recovery

Process of recovering visible information from digital images.

32
New cards

Data Hiding Techniques

Alters file metadata to hide forensic clues.

33
New cards

File Extension Manipulation

Hides data by appending it to existing files.

34
New cards

Timestamp Manipulation

Modifying timestamps of files to mislead investigators.

35
New cards

Anti-Forensic Techniques

Techniques used to obscure or eliminate data.

36
New cards

Host Protected Area (HPA) and Device Configuration Overlay (DCO)

A technique used for data hiding as well as the hidden areas on the HDD.

37
New cards

Disk Wiping and Encryption

A way to hide or distort data for forensic countermeasures.

38
New cards

Data Sanitization

Overwriting data to prevent recovery.

39
New cards

Encryption

Using algorithms to render data unreadable without a key.

40
New cards

Metadata Analysis

Searching metadata for inconsistencies or anomalies.

41
New cards

Bitmap Image

Collection of dots forming an image.

42
New cards

Vector Graphic

Image based on mathematical instructions.

43
New cards

Metafile Graphic

Combination of bitmap and vector graphics.

44
New cards

Bitmap Image

Grids of individual pixels.

45
New cards

Raster Image

Collection of pixels stored in rows.

46
New cards

Screen Resolution

Determines the amount of detail in an image.

47
New cards

Vector Graphics

Uses lines instead of dots to create images.

48
New cards

Metafile Graphics

Combines raster and vector graphics.

49
New cards

.png

Portable Network Graphic.

50
New cards

.gif

Graphic Interchange Format.

51
New cards

.jpeg/.jpg

Joint Photographic Experts Group.

52
New cards

.tiff/.tif

Tagged Image File Format.

53
New cards

.bmp

Windows Bitmap.

54
New cards

.hpgl

Hewlett Packard Graphics Language.

55
New cards

.dxf

Autocad.

56
New cards

Raw file format

Refers to a digital negative and is typically found on higher-end digital cameras.

57
New cards

Demosaicing

The process of converting raw picture data to another format.

58
New cards

Exchangeable Image File format (Exif)

Commonly used to store digital pictures; a standard for storing metadata in JPEG and TIF files.

59
New cards

Data compression

Coding data from a larger to a smaller form.

60
New cards

Lossless compression

Reduces file size without removing data.

61
New cards

Lossy compression

Permanently discards bits of information.

62
New cards

EOI Marker (FFD9)

The file marker for all JPEG files.

63
New cards

XIF file format

The first three bytes that are the same as a TIF file and are used to build a header search string.

64
New cards

Steganography

Practice of concealing a file within another file.

65
New cards

Steganography

Hides information inside image files.

66
New cards

Insertion Steganography

Hidden data is not displayed when viewing host file in its associated program.

67
New cards

Substitution Steganography

Replaces bits of the host file with other bits of data.

68
New cards

Steganalysis

Science of detecting the presence of hidden data in cover media files.

69
New cards

Error Level Analysis (ELA)

Shows inconsistencies in areas which may have been copy-pasted or cloned.

70
New cards

Host Protected Area (HPA) and Device Configuration Overlay (DCO)

One of the anti-forensic techniques used for data hiding, as well as the hidden areas on the HDD.

71
New cards

Image Recovery

Process of recovering visible information from digital images.

72
New cards

Data Hiding Techniques

Alters file metadata to hide forensic clues.

73
New cards

File Extension Manipulation

Hides data by appending it to existing files.

74
New cards

Timestamp Manipulation

Modifying timestamps of files to mislead investigators.

75
New cards

Anti-Forensic Techniques

Techniques used to obscure or eliminate data.

76
New cards

Host Protected Area (HPA) and Device Configuration Overlay (DCO)

A technique used for data hiding as well as the hidden areas on the HDD.

77
New cards

Disk Wiping and Encryption

A way to hide or distort data for forensic countermeasures.

78
New cards

Overwriting data to prevent

79
New cards

Overwriting data to prevent recovery.

Data Sanitization

80
New cards

Using algorithms to render data unreadable without a key.

Encryption

81
New cards

Searching metadata for inconsistencies or anomalies.

Metadata Analysis

82
New cards

Data Carving

The process of identifying and extracting data that has been concealed or hidden within a file or storage medium.

83
New cards

Data Visualization

A representation of data in a human-readable format.

84
New cards

Data Validation

The process of ensuring data is accurate, consistent, and reliable.

85
New cards

Data Mining

A technique used to analyze large datasets to uncover hidden patterns, unknown correlations, market trends, customer preferences, and other useful information.

86
New cards

Database

A structured set of data held in a computer, especially one that is accessible in various ways.

87
New cards

Data Conversion

A process in which data is converted from one format to another.

88
New cards

Metadata

Data that describes other data

89
New cards

Data Encoding

The format and structure in which data is stored or transmitted.

90
New cards

Data Accuracy

A measure of the precision and reliability of data.

91
New cards

Data Integrity

Ensuring that data is consistently represented and stored correctly across all instances.

92
New cards

Data Governance

Standards and guidelines for managing and protecting data throughout its lifecycle.

93
New cards

Data Deduplication

A process for removing duplicate or redundant data entries to improve data quality.