O'Reilly logo

System Forensics, Investigation, and Response by K Rudolph, John R. Vacca

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Glossary of Key Terms

802.11 standards

A set of wireless local area network (LAN) standards for computer communication in the 2.4, 3.6, and 5 GHz frequency bands.

A

Adverse event

An event with negative consequences, such a system crash, network packet floods, unauthorized use of system privileges, unauthorized access to sensitive data, and execution of malicious code that destroys data.

Algorithm

A step-by-step procedure that a computer follows to solve a problem.

Alternate data streams (ADS)

In Microsoft's NTFS (NT File System), metadata associated with a file system object. ADS can be used to hide data.

Ambient computer data

Data stored in the Windows swap file, unallocated space, and file slack. It includes e-mail fragments, word processing fragments, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required