1. A set of codes defining all the various keystrokes you American Stan-
could make, including letters, numbers, characters, dard Code for
and even the spacebar and return keys. Information Inter-
change (ASCII)
2. The process of sending an email message to an Anonymous re-
anonymizer. The anonymizer strips identifying infor- mailing
mation from an email message before forwarding it
with the anonymous mailing computer's IP address.
3. The actions that perpetrators take to conceal their Anti-forensics
locations, activities, or identities.
4. Cryptography wherein two keys are used: one to en- Asymmetric cryp-
crypt the message and another to decrypt it. tography
5. A high-speed connection technology that uses Asynchronous
fixed-length, 53-byte packets called calls. transfer mode
(ATM)
6. To verify the identity of a person, or to verify evi- Authenticate
dence.
7. The part of the cell network responsible for commu- Base transceiver
nications between the mobile phone and the network station (BTS)
switching system.
8. The basic instructions stored on a chip for booting up Basic input/output
the computer. system (BIOS)
9. Information at the level of actual 1s and 0s stored in Bit-level informa-
memory or on the storage device. tion
10. A form of cryptography that encrypts data in blocks; Block cipher
64-bit blocks are quite common, although some algo-
rithms (like AES) use larger blocks.
11. A special program, such as U-Boot or RedBoot, that Bootstrap environ-
is stored in a special section of the flash memory. ment
, WGU D431 - Digital Forensics in Cybersecurity
12. An attack in which the attacker tries to decrypt a Brute-force attack
message by simply applying every possible key in the
keyspace.
13. A plan for maintaining minimal operations until the Business continu-
business can return to full normal operations. ity plan (BCP)
14. An analysis of how specific incidents might impact Business impact
the business operations. analysis (BIA)
15. The method of cryptography in which someone Caesar cipher
chooses a number by which to shift each letter of
a text in the alphabet and substitute the new letter
for the letter being encrypted. This is also known
as a monoalphabet, single-alphabet, or substitution
cipher.
16. The signal, stream, or data file in which the payload Carrier
is hidden.
17. The process of searching the contents of cell phones. Cell-phone foren-
sics
18. The continuity of control of evidence that makes it Chain of custody
possible to account for all that has happened to evi-
dence between its original collection and its appear-
ance in court, preferably unaltered.
19. The type of medium used to hide data in steganogra- Channel
phy. This may be photos, video, sound files, or Voice
over IP.
20. An environment that has a controlled level of con- Clean room
tamination, such as from dust, microbes, and other
particles.
21. The practice of delivering hosted services over the Cloud computing
internet. This can be software as a service, platform
as a service, or infrastructure as a service.
, WGU D431 - Digital Forensics in Cybersecurity
22. The use of analytical and investigative techniques Computer foren-
to identify, collect, examine, and preserve comput- sics
er-based material for presentation as evidence in a
court of law.
23. A technique for file system repair that involves scan- Consistency
ning a disk's logical structure and ensuring that it is checking
consistent with its specification.
24. A method of using techniques other than brute force Cryptanalysis
to derive a cryptographic key.
25. An extensive document expounding one's experi- Curriculum vitae
ence and qualifications for a position, similar to a (CV)
résumé but with more detail. In academia and expert
work, it is usually used rather than a résumé.
26. The use of electronic communications to harass or Cyberstalking
threaten another person.
27. The act of ensuring the data that is extracted is con- Data consistency
sistent.
28. The standard holding that only methods and tools Daubert standard
widely accepted in the scientific community can be
used in court.
29. Information that helps explain other evidence. An ex- Demonstrative ev-
ample is a chart that explains a technical concept to idence
the judge and jury.
30. An attack designed to overwhelm the target system Denial-of-service
so it can no longer reply to legitimate requests for (DoS) attack
connection.
31. Information that has been processed and assembled Digital evidence
so that it is relevant to an investigation and supports
a specific finding or determination.
32. Digital forensics