Forensic Examination of Digital Evidence
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
FORENSIC EXAMINATION OF DIGITAL EVIDENCE: A GUIDE FOR LAW ENFORCEMENT<br />
Steganography: The art and science <strong>of</strong><br />
communicating in a way that hides the<br />
existence <strong>of</strong> the communication. It is used<br />
to hide a file inside another. For example, a<br />
child pornography image can be hidden<br />
inside another graphic image file, audio<br />
file, or other file format.<br />
System administrator: The individual<br />
who has legitimate supervisory rights<br />
over a computer system. The administrator<br />
maintains the highest access to the system.<br />
Also can be known as sysop, sysadmin,<br />
and system operator.<br />
Unallocated space: Allocation units<br />
not assigned to active files within a file<br />
system.<br />
Write protection: Hardware or s<strong>of</strong>tware<br />
methods <strong>of</strong> preventing data from being<br />
written to a disk or other medium.<br />
41