Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Investigation sponsored by an organization. |
|
|
Term
| Investigative steps broken down |
|
Definition
| Identify/assess, collection/acquisition, preservation, examination, analysis, reporting. |
|
|
Term
| Malicious code and communications |
|
Definition
| Deliberate damage to system data or hardware. |
|
|
Term
|
Definition
| Person(s) who are directly effected. |
|
|
Term
|
Definition
| Intentional destruction or hiding of data. i.e. booby traps. |
|
|
Term
|
Definition
| Making data unaccessable with out decription code. |
|
|
Term
|
Definition
| Intentional hiding of data in other files in plain sight. |
|
|
Term
|
Definition
| Hold placed on data on network or individual system as to preserve it. |
|
|
Term
|
Definition
| OIverview and prioritizing exhibits or data. |
|
|
Term
|
Definition
| Series of steps a file must go through to be useable to humans. |
|
|
Term
|
Definition
| American Standard Code for Information Exchange. * bit code to represent characters, symbols numbers, etc. |
|
|
Term
|
Definition
| If something can be seen during a search, seizure is fair game. |
|
|