WGU D431 - Digital Forensics in Cybersecurity
A set of codes defining all the various
keystrokes you could make, including let- American Standard Code for Information
ters, numbers, characters, and even the Interchange (ASCII)
spacebar and return keys.
The process of sending an email mes-
sage to an anonymizer. The anonymiz-
er strips identifying information from an
Anonymous remailing
email message before forwarding it with
the anonymous mailing computer's IP
address.
The actions that perpetrators take to
conceal their locations, activities, or Anti-forensics
identities.
Cryptography wherein two keys are
used: one to encrypt the message and Asymmetric cryptography
another to decrypt it.
A high-speed connection technology
that uses fixed-length, 53-byte packets Asynchronous transfer mode (ATM)
called calls.
To verify the identity of a person, or to
Authenticate
verify evidence.
The part of the cell network responsible
for communications between the mobile
Base transceiver station (BTS)
phone and the network switching sys-
tem.
The basic instructions stored on a chip
Basic input/output system (BIOS)
for booting up the computer.
Information at the level of actual 1s and
0s stored in memory or on the storage Bit-level information
device.
A form of cryptography that encrypts
data in blocks; 64-bit blocks are quite
Block cipher
common, although some algorithms (like
AES) use larger blocks.
, WGU D431 - Digital Forensics in Cybersecurity
A special program, such as U-Boot or
RedBoot, that is stored in a special sec- Bootstrap environment
tion of the flash memory.
An attack in which the attacker tries to
decrypt a message by simply applying Brute-force attack
every possible key in the keyspace.
A plan for maintaining minimal opera-
tions until the business can return to full Business continuity plan (BCP)
normal operations.
An analysis of how specific incidents
Business impact analysis (BIA)
might impact the business operations.
The method of cryptography in which
someone chooses a number by which to
shift each letter of a text in the alphabet
and substitute the new letter for the let- Caesar cipher
ter being encrypted. This is also known
as a monoalphabet, single-alphabet, or
substitution cipher.
The signal, stream, or data file in which
Carrier
the payload is hidden.
The process of searching the contents of
Cell-phone forensics
cell phones.
The continuity of control of evidence that
makes it possible to account for all that
has happened to evidence between its Chain of custody
original collection and its appearance in
court, preferably unaltered.
The type of medium used to hide data
in steganography. This may be photos, Channel
video, sound files, or Voice over IP.
An environment that has a controlled lev-
el of contamination, such as from dust, Clean room
microbes, and other particles.
The practice of delivering hosted ser-
Cloud computing
vices over the internet. This can be soft-
, WGU D431 - Digital Forensics in Cybersecurity
ware as a service, platform as a service,
or infrastructure as a service.
The use of analytical and investigative
techniques to identify, collect, examine,
and preserve computer-based material Computer forensics
for presentation as evidence in a court of
law.
A technique for file system repair that in-
volves scanning a disk's logical structure
Consistency checking
and ensuring that it is consistent with its
specification.
A method of using techniques other than
Cryptanalysis
brute force to derive a cryptographic key.
An extensive document expounding
one's experience and qualifications for
a position, similar to a résumé but with
Curriculum vitae (CV)
more detail. In academia and expert
work, it is usually used rather than a
résumé.
The use of electronic communications to
Cyberstalking
harass or threaten another person.
The act of ensuring the data that is ex-
Data consistency
tracted is consistent.
The standard holding that only methods
and tools widely accepted in the scientif- Daubert standard
ic community can be used in court.
Information that helps explain other ev-
idence. An example is a chart that ex-
Demonstrative evidence
plains a technical concept to the judge
and jury.
An attack designed to overwhelm the tar-
get system so it can no longer reply to Denial-of-service (DoS) attack
legitimate requests for connection.
Information that has been processed
Digital evidence
and assembled so that it is relevant to
A set of codes defining all the various
keystrokes you could make, including let- American Standard Code for Information
ters, numbers, characters, and even the Interchange (ASCII)
spacebar and return keys.
The process of sending an email mes-
sage to an anonymizer. The anonymiz-
er strips identifying information from an
Anonymous remailing
email message before forwarding it with
the anonymous mailing computer's IP
address.
The actions that perpetrators take to
conceal their locations, activities, or Anti-forensics
identities.
Cryptography wherein two keys are
used: one to encrypt the message and Asymmetric cryptography
another to decrypt it.
A high-speed connection technology
that uses fixed-length, 53-byte packets Asynchronous transfer mode (ATM)
called calls.
To verify the identity of a person, or to
Authenticate
verify evidence.
The part of the cell network responsible
for communications between the mobile
Base transceiver station (BTS)
phone and the network switching sys-
tem.
The basic instructions stored on a chip
Basic input/output system (BIOS)
for booting up the computer.
Information at the level of actual 1s and
0s stored in memory or on the storage Bit-level information
device.
A form of cryptography that encrypts
data in blocks; 64-bit blocks are quite
Block cipher
common, although some algorithms (like
AES) use larger blocks.
, WGU D431 - Digital Forensics in Cybersecurity
A special program, such as U-Boot or
RedBoot, that is stored in a special sec- Bootstrap environment
tion of the flash memory.
An attack in which the attacker tries to
decrypt a message by simply applying Brute-force attack
every possible key in the keyspace.
A plan for maintaining minimal opera-
tions until the business can return to full Business continuity plan (BCP)
normal operations.
An analysis of how specific incidents
Business impact analysis (BIA)
might impact the business operations.
The method of cryptography in which
someone chooses a number by which to
shift each letter of a text in the alphabet
and substitute the new letter for the let- Caesar cipher
ter being encrypted. This is also known
as a monoalphabet, single-alphabet, or
substitution cipher.
The signal, stream, or data file in which
Carrier
the payload is hidden.
The process of searching the contents of
Cell-phone forensics
cell phones.
The continuity of control of evidence that
makes it possible to account for all that
has happened to evidence between its Chain of custody
original collection and its appearance in
court, preferably unaltered.
The type of medium used to hide data
in steganography. This may be photos, Channel
video, sound files, or Voice over IP.
An environment that has a controlled lev-
el of contamination, such as from dust, Clean room
microbes, and other particles.
The practice of delivering hosted ser-
Cloud computing
vices over the internet. This can be soft-
, WGU D431 - Digital Forensics in Cybersecurity
ware as a service, platform as a service,
or infrastructure as a service.
The use of analytical and investigative
techniques to identify, collect, examine,
and preserve computer-based material Computer forensics
for presentation as evidence in a court of
law.
A technique for file system repair that in-
volves scanning a disk's logical structure
Consistency checking
and ensuring that it is consistent with its
specification.
A method of using techniques other than
Cryptanalysis
brute force to derive a cryptographic key.
An extensive document expounding
one's experience and qualifications for
a position, similar to a résumé but with
Curriculum vitae (CV)
more detail. In academia and expert
work, it is usually used rather than a
résumé.
The use of electronic communications to
Cyberstalking
harass or threaten another person.
The act of ensuring the data that is ex-
Data consistency
tracted is consistent.
The standard holding that only methods
and tools widely accepted in the scientif- Daubert standard
ic community can be used in court.
Information that helps explain other ev-
idence. An example is a chart that ex-
Demonstrative evidence
plains a technical concept to the judge
and jury.
An attack designed to overwhelm the tar-
get system so it can no longer reply to Denial-of-service (DoS) attack
legitimate requests for connection.
Information that has been processed
Digital evidence
and assembled so that it is relevant to