Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Investigation sponsored by an organization. |
|
|
Term
Investigative steps broken down |
|
Definition
Identify/assess, collection/acquisition, preservation, examination, analysis, reporting. |
|
|
Term
Malicious code and communications |
|
Definition
Deliberate damage to system data or hardware. |
|
|
Term
|
Definition
Person(s) who are directly effected. |
|
|
Term
|
Definition
Intentional destruction or hiding of data. i.e. booby traps. |
|
|
Term
|
Definition
Making data unaccessable with out decription code. |
|
|
Term
|
Definition
Intentional hiding of data in other files in plain sight. |
|
|
Term
|
Definition
Hold placed on data on network or individual system as to preserve it. |
|
|
Term
|
Definition
OIverview and prioritizing exhibits or data. |
|
|
Term
|
Definition
Series of steps a file must go through to be useable to humans. |
|
|
Term
|
Definition
American Standard Code for Information Exchange. * bit code to represent characters, symbols numbers, etc. |
|
|
Term
|
Definition
If something can be seen during a search, seizure is fair game. |
|
|