Digital Forensics
Across
- 2. Decision returned by a jury
- 6. Rebuilding data files
- 7. Compression that permanently discards bits
- 9. Codes of professional conduct or responsibility
- 13. Application of computer science and investigative procedures for a legal purpose (2 words)
- 14. Hardware/software that prevents writing data to a drive
- 16. Converting raw picture data to another format (e.g. JPEG)
- 20. Cryptographic technique for embedding information in another file
- 23. Graphics based on mathematical lines, curves and shapes
- 25. In NTFS, a field containing metadata about the file or folder
- 28. A "picture" of the file system at a point in time
- 29. Acquisition method use when a computer cannot be shut down
- 30. Logical acquisition that also collects deleted data
- 31. Windows database containing hardware/software configuration
- 32. Operating systems "road map" to data on a disk (2 words)
- 33. Evidence that indicates the suspect is innocent
Down
- 1. Route evidence takes from acquisition until the case is closed or goes to court (3 words)
- 3. Process by which attorneys seek information before a trial
- 4. Bit-by-bit duplicate of data on the original storage medium (2 words)
- 5. Acquisition method that captures only specific files of interest to a case
- 8. Notarized document created to justify issuing a warrant
- 10. Computer setup to allow copying of forensic evidence
- 11. Device or software on a network that monitors traffic (2 words)
- 12. Process of trying to get a suspect to confess
- 15. Legal document allowing law enforcement to search for evidence
- 17. Evidence that indicates a suspect is guilty
- 18. Sector-by-sector encryption of an entire drive (2 words)
- 19. Software that runs virtual machines
- 21. Data about data
- 22. Compression in which no data is lost
- 24. Logical drive on a disk
- 26. Pulling relevant data from an disk image
- 27. Recovering file fragments scattered across a disk