Final Crossword Digital Forensics

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 2. compression algorithm that does not alters orginal data
  2. 4. attempts to get personal infor by luring readers to false websites
  3. 7. Ways of appending data to existing files
  4. 9. takes place when you start up a computer
  5. 10. intercept and log traffic that passes over a computer network
  6. 14. reconstruction of fragments of files that have been deleted
  7. 15. bit-for-bit copy of the RAW data
  8. 16. : determining how much risk is acceptable
  9. 21. demonstrate that a claim is valid based on facts and evidence presented
  10. 22. where data is stored
  11. 23. multiple layers of security controls
  12. 31. test result that is positive when actually is not
  13. 32. recovery task in a digital investigation that is the most challenging
  14. 33. : types and frequencies of crimes committed
  15. 35. : heavy-duty file cabinet with a quality padlock
  16. 37. practice of hiding a secret message in something that is not secret
  17. 38. discussed outside the presence of the jury
Down
  1. 1. the end of a stored file to the end of that file cluster
  2. 3. this forensics software makes image files with the extension of .e01
  3. 5. statement made by someone other than the witness
  4. 6. trace information while keeping it secure
  5. 8. pointers to other files
  6. 11. moves each digit in a set of bits left or right
  7. 12. submitting many passwords with the hope of guessing one correctly
  8. 13. DNS points them to a face site
  9. 17. records in the MFT
  10. 18. access the same file by different filenames
  11. 19. : One way to investigate older and unusual computing systems
  12. 20. easy way to test if lossless works
  13. 24. descriptive data (meta-data) in an image file
  14. 25. conduct a personal or property search, or obtain a warrant
  15. 26. refers to a disk's logical structure
  16. 27. allocation of a cloud provider's resources and services
  17. 28. permits limited use of copyrighted material
  18. 29. : listing all people who have accessed your lab
  19. 30. not openly acknowledged or displayed
  20. 34. a person who brings a case against another
  21. 36. info about the sender, recipient, email's route to get to the inbox