WGU D431 - Digital Forensics in Cybersecurity
Study online at https://quizlet.com/_e1cdsb
1. American Stan- A set of codes defining all the various keystrokes you could make, including letters,
dard Code for In- numbers, characters, and even the spacebar and return keys.
formation Inter-
change (ASCII)
2. Anonymous re- The process of sending an email message to an anonymizer. The anonymizer
mailing strips identifying information from an email message before forwarding it with
the anonymous mailing computer's IP address.
3. Anti-forensics The actions that perpetrators take to conceal their locations, activities, or identities.
4. Asymmetric cryp- Cryptography wherein two keys are used: one to encrypt the message and another
tography to decrypt it.
5. Asynchronous A high-speed connection technology that uses fixed-length, 53-byte packets
transfer mode called calls.
(ATM)
6. Authenticate To verify the identity of a person, or to verify evidence.
7. Base transceiver The part of the cell network responsible for communications between the mobile
station (BTS) phone and the network switching system.
8. Basic input/out- The basic instructions stored on a chip for booting up the computer.
put system
(BIOS)
9. Bit-level informa- Information at the level of actual 1s and 0s stored in memory or on the storage
tion device.
10. Block cipher A form of cryptography that encrypts data in blocks; 64-bit blocks are quite
common, although some algorithms (like AES) use larger blocks.
11.
, WGU D431 - Digital Forensics in Cybersecurity
Study online at https://quizlet.com/_e1cdsb
Bootstrap envi- A special program, such as U-Boot or RedBoot, that is stored in a special section
ronment of the flash memory.
12. Brute-force at- An attack in which the attacker tries to decrypt a message by simply applying every
tack possible key in the keyspace.
13. Business conti- A plan for maintaining minimal operations until the business can return to full
nuity plan (BCP) normal operations.
14. Business impact An analysis of how specific incidents might impact the business operations.
analysis (BIA)
15. Caesar cipher The method of cryptography in which someone chooses a number by which to
shift each letter of a text in the alphabet and substitute the new letter for the
letter being encrypted. This is also known as a monoalphabet, single-alphabet,
or substitution cipher.
16. Carrier The signal, stream, or data file in which the payload is hidden.
17. Cell-phone foren- The process of searching the contents of cell phones.
sics
18. Chain of custody The continuity of control of evidence that makes it possible to account for all that
has happened to evidence between its original collection and its appearance in
court, preferably unaltered.
19. Channel The type of medium used to hide data in steganography. This may be photos,
video, sound files, or Voice over IP.
20. Clean room An environment that has a controlled level of contamination, such as from dust,
microbes, and other particles.
21. Cloud computing The practice of delivering hosted services over the internet. This can be software
as a service, platform as a service, or infrastructure as a service.
, WGU D431 - Digital Forensics in Cybersecurity
Study online at https://quizlet.com/_e1cdsb
22. Computer foren- The use of analytical and investigative techniques to identify, collect, examine, and
sics preserve computer-based material for presentation as evidence in a court of law.
23. Consistency A technique for file system repair that involves scanning a disk's logical structure
checking and ensuring that it is consistent with its specification.
24. Cryptanalysis A method of using techniques other than brute force to derive a cryptographic
key.
25. Curriculum vitae An extensive document expounding one's experience and qualifications for a
(CV) position, similar to a résumé but with more detail. In academia and expert work,
it is usually used rather than a résumé.
26. Cyberstalking The use of electronic communications to harass or threaten another person.
27. Data consistency The act of ensuring the data that is extracted is consistent.
28. Daubert stan- The standard holding that only methods and tools widely accepted in the scientific
dard community can be used in court.
29. Demonstrative Information that helps explain other evidence. An example is a chart that explains
evidence a technical concept to the judge and jury.
30. Denial-of-service An attack designed to overwhelm the target system so it can no longer reply to
(DoS) attack legitimate requests for connection.
31. Digital evidence Information that has been processed and assembled so that it is relevant to an
investigation and supports a specific finding or determination.
32. Digital forensics Computer forensics expanded to include smartphones, smart watches, and other
current and forthcoming digital media and devices.
33. Disaster recovery A plan for returning the business to full normal operations.
plan (DRP)
Study online at https://quizlet.com/_e1cdsb
1. American Stan- A set of codes defining all the various keystrokes you could make, including letters,
dard Code for In- numbers, characters, and even the spacebar and return keys.
formation Inter-
change (ASCII)
2. Anonymous re- The process of sending an email message to an anonymizer. The anonymizer
mailing strips identifying information from an email message before forwarding it with
the anonymous mailing computer's IP address.
3. Anti-forensics The actions that perpetrators take to conceal their locations, activities, or identities.
4. Asymmetric cryp- Cryptography wherein two keys are used: one to encrypt the message and another
tography to decrypt it.
5. Asynchronous A high-speed connection technology that uses fixed-length, 53-byte packets
transfer mode called calls.
(ATM)
6. Authenticate To verify the identity of a person, or to verify evidence.
7. Base transceiver The part of the cell network responsible for communications between the mobile
station (BTS) phone and the network switching system.
8. Basic input/out- The basic instructions stored on a chip for booting up the computer.
put system
(BIOS)
9. Bit-level informa- Information at the level of actual 1s and 0s stored in memory or on the storage
tion device.
10. Block cipher A form of cryptography that encrypts data in blocks; 64-bit blocks are quite
common, although some algorithms (like AES) use larger blocks.
11.
, WGU D431 - Digital Forensics in Cybersecurity
Study online at https://quizlet.com/_e1cdsb
Bootstrap envi- A special program, such as U-Boot or RedBoot, that is stored in a special section
ronment of the flash memory.
12. Brute-force at- An attack in which the attacker tries to decrypt a message by simply applying every
tack possible key in the keyspace.
13. Business conti- A plan for maintaining minimal operations until the business can return to full
nuity plan (BCP) normal operations.
14. Business impact An analysis of how specific incidents might impact the business operations.
analysis (BIA)
15. Caesar cipher The method of cryptography in which someone chooses a number by which to
shift each letter of a text in the alphabet and substitute the new letter for the
letter being encrypted. This is also known as a monoalphabet, single-alphabet,
or substitution cipher.
16. Carrier The signal, stream, or data file in which the payload is hidden.
17. Cell-phone foren- The process of searching the contents of cell phones.
sics
18. Chain of custody The continuity of control of evidence that makes it possible to account for all that
has happened to evidence between its original collection and its appearance in
court, preferably unaltered.
19. Channel The type of medium used to hide data in steganography. This may be photos,
video, sound files, or Voice over IP.
20. Clean room An environment that has a controlled level of contamination, such as from dust,
microbes, and other particles.
21. Cloud computing The practice of delivering hosted services over the internet. This can be software
as a service, platform as a service, or infrastructure as a service.
, WGU D431 - Digital Forensics in Cybersecurity
Study online at https://quizlet.com/_e1cdsb
22. Computer foren- The use of analytical and investigative techniques to identify, collect, examine, and
sics preserve computer-based material for presentation as evidence in a court of law.
23. Consistency A technique for file system repair that involves scanning a disk's logical structure
checking and ensuring that it is consistent with its specification.
24. Cryptanalysis A method of using techniques other than brute force to derive a cryptographic
key.
25. Curriculum vitae An extensive document expounding one's experience and qualifications for a
(CV) position, similar to a résumé but with more detail. In academia and expert work,
it is usually used rather than a résumé.
26. Cyberstalking The use of electronic communications to harass or threaten another person.
27. Data consistency The act of ensuring the data that is extracted is consistent.
28. Daubert stan- The standard holding that only methods and tools widely accepted in the scientific
dard community can be used in court.
29. Demonstrative Information that helps explain other evidence. An example is a chart that explains
evidence a technical concept to the judge and jury.
30. Denial-of-service An attack designed to overwhelm the target system so it can no longer reply to
(DoS) attack legitimate requests for connection.
31. Digital evidence Information that has been processed and assembled so that it is relevant to an
investigation and supports a specific finding or determination.
32. Digital forensics Computer forensics expanded to include smartphones, smart watches, and other
current and forthcoming digital media and devices.
33. Disaster recovery A plan for returning the business to full normal operations.
plan (DRP)