Index
Page numbers in italics indicate figures and tables
A
Administrative review process,
32
American Academy of Forensic Sciences (AAFS),
8–9
American Society for Testing and Materials (ASTM),
9–10,
42
American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB),
9,
40–42
Antiforensics techniques,
82
Antistatic material bags,
52
Asymmetrical encryption,
85
Authentication Center (AuC),
147
B
Base station controller (BSC),
147
Bind, Torture, Kill (BTK),
3–4
Brute force attacks,
88–90
C
Campus Area Networks (CANs),
133
Cellular networks
Central processing unit (CPU),
19,
27
Chronological order method,
51
Client/server network,
132
forensic image formats,
55
forensically clean media,
55
Cloud
Cloud Service Provider (CSP),
165
Code Division Multiple Access (CDMA),
148–149
Complex encryption schemes,
86
Computer Forensic Tool Testing (CFTT),
9,
36
Computer Security Incident Handling Guide,
137
Computing environments,
19–20
Criminal law
reasonable expectation of privacy,
104–105
search warrant requirement, exceptions,
105–108
Cryptographic algorithm,
83
Cyclical redundancy check (CRC),
134
D
Data
v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993),
114
Device Configuration Overlays (DCO),
22
Digital forensics,
2–3,
69
tools
uses of
administrative matters,
6–7
criminal investigations,
3–4
Locard's exchange principle,
7
Direct Client Connection (DCC),
125
Distributed Denial of Service (DDoS),
135
Document and Media Exploitation (DOMEX),
5
Documentation process,
49
Domain Name Server (DNS),
118
Dutch National High Tech Crime Unit (NHTCU),
136
E
Electronic communication service (ECS),
110
Electronic Communications Privacy Act (ECPA),
105
Electronic Serial Number (ESN),
149
Electronically stored information (ESI),
111
Encrypting File System (EFS),
87
breaking passwords,
88–89
Enhanced Meta File (EMF),
70
Examiner's final report,
35
Exigent circumstances,
107
F
Federal Rules of Civil Procedure,
4
Fidelity National Information Services Inc. (FIS),
131
File Allocation Table (FAT),
21
File Translation Layer,
168
Flash based hard drives,
18
Florida Department of Law Enforcement (FDLE),
164
Footprinting/fingerprinting,
136
Forensic examiner in judicial system, role of,
10
Forensic image formats,
55
Forensic laboratories
Forensic Science Education Programs Accreditation Commission (FEPAC),
8
Forensic Toolkit (FTK),
37,
39
Forensically clean media,
55
Full disk encryption (FDE),
86
G
Global area networks (GANs),
133
Global Positioning System (GPS),
157–160
Global System for Mobile Communication (GSM),
148–149
H
Hardware write blocking (HWB) device,
36
Hashing
Hierarchical File System Plus (HFS+),
22
Home Location Register (HLR),
147
Host Protected Area (HPA),
22
Hypertext Markup Language (HTML),
118
Hypertext Transfer Protocol (HTTP),
117
I
Identity Spoofing (IP Spoofing),
136
Infrastructure as a Service (IaaS),
19–20
Integrated Circuit Card Identifier (ICC-ID),
154
Integrated Digitally Enhanced Network (iDEN),
149
International electronic discovery,
113
International Mobile Equipment Identifier (IMEI),
149
International Mobile Subscriber Identity (IMSI),
154
Internet
Internet Message Access Protocol (IMAP),
126
Internet Protocol (IP),
118
Internet Relay Chat (IRC),
125
Internet Service Providers (ISPs),
110,
134,
140
Interworking functions,
147
Intrusion Detection System (IDS),
135
J
K
L
Live system
live acquisition concerns,
56–57
live collection
conducting and documenting,
58–59
Local Area Network (LAN),
133
Locard's exchange principle,
7
M
Man-In-The Middle-Attack,
136
Marshall University Digital Forensics,
14,
14,
14
Metropolitan Area Networks (MANs),
133
Mobile Switching Center (MSC),
147–148
Most Recently Used (MRU),
76,
76
Multimedia Messaging Services (MMS),
148
N
National Academy of Sciences (NAS),
8
National Initiative Cyber Security Education (NICE),
9
National Institute of Standards and Technology (NIST),
8,
36,
137,
165
National Software References Library,
9
Network intrusion detection system (NIDS),
135
Network security tools
evidence and investigations
Network signals, protecting cell phones from,
48
New Technology File System (NTFS),
21,
87
Nonvolatile memory,
18–19
O
Office of the Inspector General (OIG),
6
Open Handset Alliance,
150
Oxygen Forensic Suite,
156
P
Password Recovery Toolkit (PRTK),
89
Personal Area Networks (PANs),
133
Personal Identification Number (PIN),
151,
155
Personal Unlock Key (PUK),
151
Platform as a Service (PaaS),
19–20
Points of Interest (POI),
158
Post Office Protocol (POP),
126
Postincident activity,
138
Public Switched Telephone Network (PSTN),
148
Q
Quality assurance (QA)
R
Random Access Memory (RAM),
19,
26
preserving evidence in,
57
Reasonable expectation of privacy,
104–105
Regional Computer Forensic Laboratory (RCFL) program,
30
internet explorer artifacts,
123–124
Remote computing service (RCS),
110
Removable storage media,
47
Restore points (RP),
76–77
Rules of Civil Procedure,
111
S
Scientific Working Group for DNA Analysis Methods (SWGDAM),
8
Scientific Working Group on Digital Evidence (SWGDE),
8,
43,
164–165
Scientific Working Groups (SWGs),
8
Securities and Exchange Commission (SEC),
6–7
Security identifier (SID),
69
Service Level Agreements (SLAs),
167
Short Message Service (SMS),
148
Short Message Service Center (SMSC),
147
Simple Mail Transfer Protocol (SMTP),
126
Social media evidence,
129
Social networking sites,
129
Software as a Service (SaaS),
19–20
Standard Operating Procedures (SOPs),
32
Steganography Analysis and Research Center (SARC),
93
Stored Communications Act (SCA),
110–111
Subscriber Identity Module (SIM),
154–155
Symmetrical encryption,
85
T
Technical review process,
32
Technical Working Groups (TWGs),
8
Temporary Internet Files (TIF),
121–122
Time Division Multiple Access (TDMA),
149
Top Level Domain (TLD),
117
Transmission Control Protocol/Internet Protocol (TCP/IP),
132
Trusted Platform Module (TPM),
87
U
Uniform Resource Locator (URL),
117,
123
United States Secret Service (USSS),
136
United States v. Frye,
113
V
Visitor Location Register (VLR),
147
W
Wear leveling process,
168
Web browsers
registry, internet explorer artifacts,
123–124
Wide Area Network (WAN),
133
Z
Zubalake v. USB Warburg,
111