Computer Forensics Flashcards Preview

Forensics > Computer Forensics > Flashcards

Flashcards in Computer Forensics Deck (37):
1

hardware

physical components of the computer; if you can touch it

2

sofeware

programs and applications that carry out a set of instructions on the hardware

3

motherboard

main system board of a computer which delivers power, data, and instructions to the computers components

4

CPU; central processing unit

"brain" of the computer; main chip, handles most of the operations

5

RAM; random access memory

volatile memory of computer; programs and instructions are stored; when power off contents lost

6

HDD; hard disk drive

main storage location within the computer; operating system, applications, and user data stored here

7

byte

a group of 8 bits

8

bit

"binary digit" ; 1s and 0s, smallest unit of information on a machine

9

visible data

all data that the operating system is presently aware of and thus is readily accessible

10

latent data

areas of files and disks that are typically not apparent to the computer user

11

internet cahce

portions of web pages placed on the local HDD to facilitate quicker retrieval

12

cookies

files places on a computer that are used to track visits to and usage of that site

13

hacking

slang; performing unauthorized computer or network intrusion

14

firewall

hardware or software designed to protect intrusions to an internet network

15

malware

malicious software; designed to infiltrate and damage computers without users consent

16

phishing

attempt to acquire sensitive information by pretending to be a trustworthy entity

17

rootkits

computer software designed to enable access to a computer or areas of its software otherwise not allowed

18

spyware

software gathers information about a person or organization without their knowledge and may send that info to another entity without consent

19

spamming

electronic messaging systems to send unsolicited messages

20

computer worm

malware computer program that replicates itself in order to spread to other computers

21

adware

automatically displays advertisements to generate revenue for its author

22

trojan horse virus

any malicious computer program which misrepresents itself as useful, routine, or interesting to persuade a victim to install it

23

top viruses

my doom 2004
sobig.f 2003
i love you 2000
code red 2001
slammer 2003

24

types of computer crime

1. computer is target
2. computer is instrument
3.computer is incidental to crime
4. associated to the prevalence of computers

25

who

hackers, crackers, phreakers, white hats (good, testing security), grey hats(in between), black hats (bad)

26

phreaking

hacking into secure telecommunication networks

27

why do it

prestige, get a job, part of job, terrorism, anti-terrorism, profit

28

mischief to data

destroying or altering data; anything to mess with data

29

unauthorized use of a computer

fraudulently obtaining any computer service

30

BTK murders

floppy disk; "erased" info; dennis rader

31

seizing a computer

label computer, all cables, and corresponding connections

32

slack space

"empty" (deleted data not erased until written over)

33

unallocated space

files are saved/deleted fragments of data can be left in unallocated space

34

defragmenting

tries to consolidate data after lots of saving/deleting

35

swap files

continuous creation of temporary files leaves data fragments

36

deleted files

not really deleted until written over

37

faraday shield

no external communication to device