Misc Terms from chapter 1 Flashcards
(7 cards)
What is the ISO 27037
information tech security techniques | This is the standardization of forniscs
what is the Def of computer forensics from the NIST
the application of science to the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data.
what do network forensics use to track /do?
Log files which can be used to ID urls, how they logged into and from what location,
how does computer forensics differ form data recovery
in CF we search for hidden files and recover data with the goal of what is found is vaild in the court of law.
what is inculpatory evidence
evidence that a suspect is guilty of a crime they are charge with
what is exculpatory evidence?
Evidence that indicates the suspect is innocent of the crime.