Copyrighted Material
INDEX Abene, Mark (Phiber Optik), 70 Appearance points (AP), wireless Access key, 72 networks, 73, 74 AccessData, 40. See also FTK Appendixes, inclusion in report, 56 ActiveX, 77 Apple Computer, 6 ADC (analog-to-digital conversion), 21 Application and file analysis, 123–125 Adleman, Len, 51 Application suites, 39, 40, 55 Admissibility of evidence ARPANET, 4 acceptable alteration of evidence, 29 Arrest and arraignment, 60 chain of custody, 119, 134, 135 ASCII (American Standard Code for and choosing course of action, 29, 30 Information Exchange), 18, 39 and goal of computer forensics, 13 Assembly language, 3 hearsay, 135–137 Asymmetric keys, 48, 49 and record keeping, 53 ATA disks, 118 Attorney-client privilege, 61 relevance, 132–134 Auction fraud, 97–99 reliability, 26, 131, 132, 135, 136 Authentication, wireless networks, 72 Adware, 75, 77, 78 AvantStar Products, 124 American Standard Code for Information Exchange (ASCII), 18, 39 Analog-to-digital conversion (ADC or Backdoors, 77–79, 112 A/D), 21 Backus, John, 3 Analog versus digital, 17, 18, 21 Bait-and-switch fraud, 98, 99 Analysis Base-2, 19 Base-10, 19, 20 application and file analysis, 123, 124 Base-16, 19 data encryption, 47–49 Basic input output system. See BIOS deleted files, 43, 44 http://www.pbookshop.comBasic integrated operating system. See execution files, 41 BIOS file extensions, 44, 45 Best evidence rule, 26, 135 file slack. See File slack Binary system, 17, 18, 20–22 file structures, 45, 46 BIOS, 32, 33, 116, 123 hidden data,COPYRIGHTED 123 Bit-stream MATERIAL images, 119 password
[Show full text]