Notice: Cache failed on disk write, class stdClass, path C:\Inetpub\vhosts\pcrforensics.com\httpdocs\cache/cmsapi/html/cmsapiDatabase/ddac8c367472d955e41dcc4e01839f2a in C:\Inetpub\vhosts\pcrforensics.com\httpdocs\plugins\cmsapi\cmsapi\cmsapi.cache.php on line 55
Notice: Cache failed on disk write, class glossaryGlossaryManager, path C:\Inetpub\vhosts\pcrforensics.com\httpdocs\cache/cmsapi/singleton/glossaryGlossaryManager in C:\Inetpub\vhosts\pcrforensics.com\httpdocs\plugins\cmsapi\cmsapi\cmsapi.cache.php on line 55
Notice: Cache failed on disk write, class glossaryEntryManager, path C:\Inetpub\vhosts\pcrforensics.com\httpdocs\cache/cmsapi/singleton/glossaryEntryManager in C:\Inetpub\vhosts\pcrforensics.com\httpdocs\plugins\cmsapi\cmsapi\cmsapi.cache.php on line 55
Glossary of Computer Forensics Terms
To image a hard drive is to make an identical copy of the hard drive, including empty sectors. Akin to cloning the data. Imaging Is the process used to obtain all of the data present on a storage media (e.g. hard disk) whether it is active data or data in free space, in such a way as to allow it to be examined as if it were the original data.
The process of analyzing a security incident how it was able to occur and how to prevent similar incidents from occurring in the future.
In Windows NT, 2000, and XP, the control file for the Recycle Bin.
A data storage unit contained in the computer housing
|Internet Service Provider (ISP)||
Any company or organization that provides individuals with access to, or data storage on, the Internet.
INTERnet Network Information Centre. InterNIC is the organisation responsible for registering and maintaining the corn, edu, gov, net and org domain names on the World Wide Web.
|Interrupt ReQuest (IRQ)||
IRQ is the name of the hardware interrupt signals that PC peripherals (such as serial or parallel ports) use to get the processor’s attention. Interrupts usually cannot be shared so devices are assigned unique IRQ addresses that enable them to communicate with the processor. Peripherals that use interrupts include LAN adapters, sound boards, scanner interfaces, and SCSI adapters
Detection of break-ins or break-in attempts either manually or via software expert systems that operate on logs or other information available on the network.
Each computer connected to the Internet is addressed using a unique 32-bit number called an IP Address. These addresses are usually written in ‘Dotted Quad’ notation, as a series of four 8-bit numbers, written in decimal and separated by periods (e.g. 151.123.456.10). Each number in the IP address falls between 0 and 255. Many computers have more than one IP address.
An attack whereby a system attempts to illicitly impersonate another system by using its IP network address.