Digital Forensics
Across
- 2. Advanced forensic imaging and analysis software
- 4. Systematic search for relevant data
- 9. Tool for automatic timeline generation from forensic data
- 13. The documented history of how evidence was handled
- 17. Well-known commercial forensics platform by OpenText
- 18. A trace or remnant left by digital activity
- 21. Recording methods, tools, and findings
- 22. Checking that findings are accurate and reproducible
- 26. Tool for recursive hashing and verification of file integrity
- 28. Framework that creates timelines from multiple data sources
- 29. Tool that unifies computer and mobile forensics
- 34. Command-line suite used with Autopsy
- 35. Ability for another analyst to reach the same results
- 37. Presenting the final results of an investigation
- 39. Rebuilding user or system actions from data
Down
- 1. Using algorithms like MD5 or SHA256 to verify file integrity
- 3. Interpreting and connecting findings to the case
- 5. The process of collecting digital data for analysis
- 6. File recovery tool that ignores the filesystem structure
- 7. Confirming that tools and processes work correctly
- 8. Framework for analyzing memory dumps
- 10. DoD-enhanced version of dd for forensics
- 11. Web-based data analysis and transformation tool
- 12. Recovering files from raw binary data
- 14. Command-line tool for recovering deleted files based on headers
- 15. Any information that can be used in court to prove or disprove a fact
- 16. Creating an exact copy of a storage device
- 19. Ensuring that evidence has not been modified
- 20. Commercial forensic analysis suite by AccessData
- 21. Unix command used to copy and image disks
- 23. Linking multiple sources of data together
- 24. Popular mobile device forensics and data extraction suite
- 25. Network protocol analyzer used for packet capture
- 27. Open-source GUI for digital forensic investigation
- 30. Comprehensive suite for file analysis and indexing
- 31. Protecting evidence from alteration or loss
- 32. Extracts email addresses, credit card numbers, and more from raw data
- 33. Chronological reconstruction of events
- 36. Tool for viewing and analyzing Windows registry hives
- 38. Confidence that evidence is genuine and untampered