CYBER FORENSICS
Across
- 2. A Disk Editing Tool
- 3. random memory dumps in hidden storage areas
- 5. Customized setting for MS-DOS
- 8. Road map to data on a disk
- 9. covertly capture sensitive information, passwords, and network logons
- 10. A system startup task
- 12. Section of a track , 512 bytes
- 14. Disk Encryption Mechanism
Down
- 1. Theft Recovery Software for Laptops and PCs
- 4. Identify potential hazards in Location
- 6. Character code used by NTFS
- 7. Encrypted files in NTFS
- 11. Type of Military Computer Forensic Technology
- 12. A group working on digital evidence
- 13. Stores time and date related information in a PC