Glossary


A-C

Access Point (AP)

Central communication point for IEEE 802.11 wireless networks.

Address Resolution Protocol (ARP)

A protocol in the TCP/IP suite that is used dynamically to associate network layer IP addresses with data-link layer MAC addresses.

Ad hocNetwork

Networks established when Bluetooth-enabled (or similar) devices come into proximity.

Anger Excitation (a.k.a. Sadistic) Behaviors

These include behaviors that evidence offender sexual gratification from victim pain and suffering. The primary motivation for the behavior is sexual, however the sexual expression for the offender is manifested in physical aggression, or torture behavior, toward the victim.

Anger Retaliatory (a.k.a. Anger or Displaced) Behaviors

These include offender behaviors that are expressions of rage, either towards a specific person, group, institution, or a symbol of either. The primary motivation for the behavior is the perception that one has been wronged or injured somehow.

Application

Software that performs a specific function or gives individuals access to Internet/network services.

Application Layer

Provides the interface between people and networks, allowing us to exchange e-mail, view Web pages, and utilize many other network services.

Asynchronous Transfer Mode (ATM)

A connection-oriented network technology that provides gigabit-per-second throughput. This high-performance network technology can transport high-quality video, voice, and data.

Attached Resource Computer Network (ARCNET)

One of the earliest local area networking technologies initially developed by Datapoint Corporation in 1977. Uses 93-ohm RG62 coaxial cable to connect computers. Early versions enabled computers to communicate at 2.5 Mbps. A newer, more versatile version called ARCNET Plus, supports 20 Mbps throughput.

Behavioral Evidence

Any type of forensic evidence that is representative or suggestive of behavior.

Behavioral Evidence Analysis

The process of examining forensic evidence, victimology, and crime scene characteristics for behavioral convergences before rendering a deductive criminal profile.

Behavior-Motivational Typology

A motivational typology that infers the motivation (i.e. Anger-retaliatory, Assertive, Reassurance, Sadistic, Profit, and Precautionary) of behavior from the convergence of other concurrent behaviors. Single behaviors can be described by more than one motivational category, as they are by no means exclusive of each other.

Broad Targeting

Any fire or an explosive that is designed to inflict damage in a wide reaching fashion. In cases involving broad targeting, there may be an intended target near the point of origin, but it may also be designed to reach beyond that primary target for other victims in the environment.

Buffer Overflow

Cleverly crafted input to a program that intentionally provides more data than the program is designed to expect, causing the program to execute commands on the system. Computer intruders use buffer flows to gain unauthorized access to servers or escalate their privileges on a system that they have already broken into.

Bulletin Board System (BBS)

An application that can run on a personal computer enabling people to connect to the computer using a modem and participate in discussions, exchange e-mail, and transfer files. These are not part of the Internet.

Collateral Victims

Those victims that an offender causes to suffer loss, harm, injury, or death (usually by virtue of proximity), in the pursuit of another victim.

Computer Cracker

Individuals who break into computers much like safe crackers break into safes. They find weak points and exploit them using specialized tools and techniques.

Computer Crime

As defined in Federal and State Statutes. Includes theft of computer services; unauthorized access to protected computers; software piracy and the alteration or theft of electronically stored information; extortion committed with the assistance of computers; obtaining unauthorized access to records from banks, credit card issuers or customer reporting agencies; traffic in stolen passwords and transmission of destructive viruses or commands.

Corpus Delicti

Literally interpreted as meaning the "body of the crime" - refers to those essential facts that show a crime has taken place.

Crime Reconstruction

The determination of the actions surrounding the commission of a crime. This may be done by using the statements of witnesses, the confession of the suspect, the statement of the living victim, or by the examination and interpretation of the physical evidence. Some refer to this process as crime scene reconstruction, however the scene is not being put back together in a rebuilding process, it is only the actions that are being reconstructed.

Crime Scene

A location where a criminal act has taken place.

Crime Scene Characteristics

The discrete physical and behavioral features of a crime scene.

Crime Scene Type

The nature of the relationship between offender behavior and the crime scene in the context of an entire criminal event (i.e. point of contact, primary scene, secondary scene, intermediate scene, or disposal site).

Cybercrime

Any offense where the modus operandi or signature involves the use of a computer network in any way.

Cyberspace

William Gibson coined this term in his 1984 novel Neuromancer. It refers to the connections and conceptual locations created using computer networks. It has become synonymous with the Internet in everyday usage.

Cyberstalking

The use of computer networks for stalking and harassment behaviors. Many offenders combine their online activities with more traditional forms of stalking and harassment such as telephoning the victim and going to the victim's home.

Cybertrail

Any convergence of digital evidence that is left behind by a victim or an offender. Used to infer behavioral patterns.




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net