23 relations: Civil law (common law), Computer forensics, Computer Online Forensic Evidence Extractor, Court, Cryptographic hash function, Data erasure, Digital evidence, Digital forensics, Disk sector, EnCase, Eoghan Casey, Forensic disk controller, Forensic Toolkit, Laity, Law enforcement agency, MD5, Microsoft, Mobile device forensics, National Software Reference Library, Network forensics, Scientific method, Search warrant, SHA-1.
Civil law is a branch of the law.
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.
Computer Online Forensic Evidence Extractor also said (COFEE) is a tool kit, developed by Microsoft, to help computer forensic investigators extract evidence from a Windows computer.
A court is a tribunal, often as a government institution, with the authority to adjudicate legal disputes between parties and carry out the administration of justice in civil, criminal, and administrative matters in accordance with the rule of law.
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
Data erasure (sometimes referred to as data clearing or data wiping) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by using zeros and ones to overwrite data onto all sectors of the device.
Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial.
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.
In computer disk storage, a sector is a subdivision of a track on a magnetic disk or optical disc.
EnCase is the shared technology within a suite of digital investigations products by Guidance Software.
Eoghan Casey is a digital forensics professional, researcher, and author.
A forensic disk controller or hardware write-block device is a specialized type of computer hard disk controller made for the purpose of gaining read-only access to computer hard drives without the risk of damaging the drive's contents.
Forensic Toolkit, or FTK, is a computer forensics software made by AccessData.
A layperson (also layman or laywoman) is a person who is not qualified in a given profession and/or does not have specific knowledge of a certain subject.
A law enforcement agency (LEA), in North American English, is a government agency responsible for the enforcement of the laws.
The MD5 algorithm is a widely used hash function producing a 128-bit hash value.
Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.
Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions.
The National Software Reference Library (NSRL), is a project of the National Institute of Standards and Technology (NIST) which maintains a repository of known software, file profiles and file signatures for use by law enforcement and other organizations involved with computer forensic investigations.
Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.
Scientific method is an empirical method of knowledge acquisition, which has characterized the development of natural science since at least the 17th century, involving careful observation, which includes rigorous skepticism about what one observes, given that cognitive assumptions about how the world works influence how one interprets a percept; formulating hypotheses, via induction, based on such observations; experimental testing and measurement of deductions drawn from the hypotheses; and refinement (or elimination) of the hypotheses based on the experimental findings.
A search warrant is a court order that a magistrate or judge issues to authorize law enforcement officers to conduct a search of a person, location, or vehicle for evidence of a crime and to confiscate any evidence they find.
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.