N-S


Narrow Targeting

Any fire or explosive that is designed to inflict specific, focused, calculated amounts of damage to a specific target. Network Interface Card (NIC) - a card (circuit board) used to connect a host to the network. Every host must have at least one network interface card.

Network Interface Card (NIC)

A piece of hardware used to connect a host to the network. Every host must have at least one network interface card. Every NIC is assigned a number called a Media Access Control (MAC) address.

Network Layer

Addresses and routes information to its destination using addresses, much like a postal service that delivers letters based on the address on the envelope.

Newsgroups

The online equivalent of public bulletin boards, enabling asynchronous communication that often resembles a discussion.

Peer-to-Peer Network (P2P)

Physical Evidence

Any physical object that can establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator.

Physical Layer

The actual media that carries data (e.g. telephone wires; fiber optic cables; satellite transmissions). This layer is not concerned with what is being transported but without it, there would be no connection between computers.

Piconet

A term to describe small networks established by Bluetooth-enabled (or similar) devices.

Point of Contact

The location where the offender first approaches or acquires a victim.

Point of Origin

The specific location at which a fire is ignited, or the specific location where a device is placed and subsequently detonated.

Port

A number that TCP/IP uses to identify Internet services/application. For example, TCP/IP e-mail applications use port 25 and Usenet applications use port 119.

Power Assertive (a.k.a. Entitlement) Behaviors

These include offender behaviors that are intended to restore the offender's self-confidence or self worth through the use of moderate to high aggression means. These behaviors suggest an underlying lack of confidence and a sense of personal inadequacy, that are expressed through control, mastery, and humiliation of the victim, while demonstrating the offender's sense of authority.

Power Reassurance (a.k.a. Compensatory) Behaviors

These include offender behaviors that are intended to restore the offender's self-confidence or self-worth through the use of low aggression or even passive and self-deprecating means. These behaviors suggest an underlying lack of confidence and a sense of personal inadequacy.

Presentation Layer

Formats and converts data to meet the conventions of the specific computer being used.

Primary Scene

The location where the offender engaged in the majority of their attack or assault upon their victim or victims.

Router

A host connected to two or more networks that can send network messages from one network (e.g. an Ethernet network) to another (e.g. an ATM network) provided the networks are using the same network protocol (e.g. TCP/IP).

Search Engine

A database of Internet resources that can be explored using key words and phrases. Search results provide direct links to information.

Secondary Scene

Any location where there may be evidence of criminal activity outside of the primary scene.

Session Layer

Coordinates dialog between computers, establishing, maintaining, managing, and terminating communications.

Signature Aspects

The emotional or psychological themes or needs that an offender satisfies when they commit offense behaviors.

Signature Behaviors

Signature behaviors are those acts committed by an offender that are not necessary to complete the offense. Their convergence can be used to suggest an offender's psychological or emotional needs (signature aspect). They are best understood as a reflection of the underlying personality, lifestyle, and developmental experiences of an offender.

Software

Computer programs that perform some function.

Souvenir

A souvenir is a personal item taken from a victim or a crime scene by an offender that serves as a reminder or token of remembrance, representing a pleasant experience. Taking souvenirs is associated with reassurance oriented behavior and needs.

Symbol

Any item, person, or group that represents something else such as an idea, a belief, a group, or even another person.

Synchronous Chat Networks

By connecting to a synchronous chat network via the Internet, individuals can interact in real-time using text, audio, video and more. Most synchronous chat networks are comprised of chat rooms, sometimes called channels, where people with similar interests gather.




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net