Forensics Unit 5

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Counterfeiting

typically, the forging of currency; also the forging of other government-issued documents (postage stamps for example) and production fo fake name brand products for profit

2
New cards

Currency

a printed document issued by a bank, guaranteeing a payment to the holder on demand

3
New cards

Document analysis

the examination of questioned documents with known material using a variety of criteria, such as authenticity, alternations, erasures, and obliterations

4
New cards

Document expert

a person who scientifically analyzes handwritten, typewritten, photocopied, and computer-generated documents and their materials for authenticity

5
New cards

Exemplar

standard document of known origin and authorship used in handwriting analysis for comparison to documents of unknown authorship (questioned documents)

6
New cards

Fact

statement or information that can be verified

7
New cards

Forgery

the making, altering, or falsifying of personal documents or other objects with the intention of deception

8
New cards

Fraudulence (fraud)

deliberate deception practiced to secure unfair or illegal financial gain

9
New cards

Gas chromatography

a method of separating chemicals to establish their quantities

10
New cards

Opinion

personal belief founded on judgment rather than on direct experience or knowledge

11
New cards

Questioned Document

any signature, handwriting, type-writing or other mark whose source or authenticity is in dispute or uncertain

12
New cards

Hardware

comprises the physical and tangible components of the computer

13
New cards

Software

a set of instructions compiled into a program that performs a particular task.

14
New cards

Computer Case/Chassis

physical box holding the fixed internal computer components in place

15
New cards

Power Supply

Converts the power it gets from the wall outlet to a useable format for the computer and it’s components

16
New cards

Motherboard

main circuit board contained within a computer (or other electronic devices)

17
New cards

System Bus

contained on the motherboard, it is a vast complex network of wires that serves to carry data from one hardware device to another

18
New cards

Read-Only Memory (ROM)

 chip store programs called firmware, which are used to start the boot process and configure a computer’s components

19
New cards

Random Access Memory (RAM)

serves to take the burden off the computer’s processor and Hard Disk Drive (HDD). Stores data, not permanent

20
New cards

Central Processing Unit (CPU)

aka processor, essentially the brains of the computer

21
New cards

Input Devices

devices used to get data into the computer (keyboard, mouse, joystick, scanner)

22
New cards

Output Devices

equipment through which data is obtained from the computer (monitor, printer, speakers)

23
New cards

Hard Disk Drive (HDD)

primary location of data storage within the computer

24
New cards

Sector

512 bytes (1 disk block) of data, the basic unit of storage

25
New cards

Cluster

a physical grouping of sectors on a storage device, or the process of grouping similar data to identify patterns and anomalies during an investigation

26
New cards

Track

portion of a disk which passes under a single stationary head during a disk rotation

27
New cards

Cylinder

comprised of the set of tracks described by all the heads (on separate platters at a single seek position.)

28
New cards

Visible Data

data of which the operating system is aware

29
New cards

Latent data

data of which the operating system is unaware

30
New cards

RAM slack

area from the end of the final sector containing data to the end of the cluster

31
New cards

File slack

the remaining area from the end of the final sector containing data to the end of the cluster

32
New cards

Unallocated space

space on a HDD that the operating system sees as empty and ready to store data

33
New cards

Deleted files

another source of latent data to be examined during forensic analysis

34
New cards

Hacking

tracking the origin of unauthorized computer intrusions

35
New cards

Firewall

device designed to protect against intrusions into a computer network

36
New cards

Secure Digital (SD)

storage expansion cards

37
New cards

Subscriber Identification Module (SIM)

cards have international mobile subscriber identity (IMSI) number that associates the phone with the subscriber’s mobile network

38
New cards

Black hat/white hat

hackers who use their skills for illegal purposes. White hats use their hacking skills to thwart crime

39
New cards

Bots

robots are programs that provide attackers with unauthorized control of a computer. They usually perform simple tasks that are repetitive at a very high rate. They can get information from many servers much faster than a human can.

40
New cards

Crimeware

software tools built with the purpose of committing online scams and stealing information from consumers and businesses

41
New cards

Firewall

network security system used to prevent unauthorized access to or from a private network

42
New cards

Malware

software designed to infiltrate or damage a computer system without the owner's consent

43
New cards

Nigerian letter scheme

a scheme where recipients are offered the “opportunity” to share in a percentage of millions of dollars if they first front some money of their own

44
New cards

Pharming

redirecting users to false websites without them knowing

45
New cards

Phishing

attempting to steal personal information by sending out emails that appear to come from legitimate websites

46
New cards

Piracy

illegal copying of copyrighted materials from the Internet.

47
New cards

Ransomware

a type of malware that locks or restricts access to a computer until a ransom is paid to the creator

48
New cards

Spam

junk or unsolicited email sent by a third party: it can be used to deliver Trojan horses, viruses and phishing attempts

49
New cards

Spyware

software that gathers information about a person or organization without the knowledge or consent of the user. It may also control a computer without the user's knowledge or consent.