Page 44 - Understandinging Forensic Technology Landscape
P. 44

Electronically stored information (ESI): As referenced   associated with creating, using, and sharing enterprise
           in the United States Federal Rules of Civil Procedure,   information. It recognizes that information is an
           information that is stored electronically, regardless of   organizational asset and as such requires high-level
           the media or whether it is in the original format in which   coordination and oversight to assure accountability,
           it was created, as opposed to being stored in hard copy   integrity, appropriate preservation, and protection of
           (that is, on paper).                                 enterprise information.
                                                                                    53
           File hashing: This is the process of an algorithm that   Link analysis: Data analysis used in network theory,
           calculates a fixed-size bit string value from a file. A file   used to evaluate the relationships or connections
           basically contains blocks of data. Hashing transforms   between network nodes. These relationships can be
           this data into a far shorter fixed-length value or key   between various types of objects (nodes), including
           which represents the original string.  Since two identical   people, organizations and even transactions.
                                          50
                                                                                                       54
           files will have the same hash, file hashing provides a
           means to prove whether or not the files are identical or   LNK: Shortcut files — or those ending in the “.lnk”
           different.                                           extension — are Windows files that link easy-to-recognize
                                                                icons to specific executable programs, and are typically
           GDPR: General Data Protection Regulation (GDPR) is a   placed on the user’s Desktop or Start Menu.
                                                                                                     55
           legal framework that sets guidelines for the collection
           and processing of personal information from individuals   Machine learning (ML): A method of data analysis that
           who live in the European Union (EU).                 automates analytical model building. It is a branch of
                                          51
                                                                AI based on the idea that systems can learn from data,
           Hash values: Numeric values that can be thought of as   identify patterns and make decisions with minimal
           fingerprints for files. The contents of a file are processed   human intervention.
                                                                                 56
           through a cryptographic algorithm, and a unique
           32-character alphanumeric value — the hash value —   Macro: A single instruction that expands automatically
           is produced that identifies the contents of the file. If   into a set of instructions to perform a particular task.
           the contents are modified in any way, the value of the   Metadata: Data that serves to provide context or
           hash will also change significantly. Two algorithms are   additional information about other data. For example,
           currently widely used to produce hash values: the MD5   information about the title, subject, author, typeface,
           and SHA1 algorithms.                                 enhancements, and size of the data file of a document

           HIPAA: Health Insurance Portability and Accountability   constitute metadata about that document. It may also
           Act of 1996 (HIPAA) is United States legislation that   describe the conditions under which the data stored in a
           provides data privacy and security provisions for    database was acquired, its accuracy, date, time, method
                                                                                                      57
           safeguarding medical information.                    of compilation and processing, and the like.
                                         52
           Information governance (IG): A strategic approach    Natural language processing (NLP): Technology that
           to maximizing the value while mitigating the risks   helps computers understand, interpret and manipulate
                                                                human language.



            50   Introduction to Hashing and its uses, 2BrightSparks, 2brightsparks.com/.../introduction-to-hashing-and-its-uses.html, accessed March 9, 2020
            51  General Data Protection Regulation (GDPR), Investopedia, investopedia.com/terms/g/general-data-protection-regulation-gdpr.asp, accessed March 9, 2020
            52  Summary of the HIPAA Privacy Rule, HHS.gov, hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html, accessed March 9, 2020
            53  Information Governance FAQs, AHIMA, ahima.org/topics/infogovernance/faqs?tabid=faq, accessed September 4, 2019
            54  Link Analysis, techopedia, techopedia.com/definition/30336/link-analysis, accessed, March 11, 2020
            55  KrebsonSecurity, Sept 2019 Edition, krebsonsecurity.com/tag/lnk/, accessed on February 20, 2020, accessed March 9, 2020
            56  A guide to machine learning algorithms and their applications, SAS, sas.com/en_us/insights/articles/analytics/machine-learning-algorithms-guide.html, accessed March 9, 2020
            57  Metadata, BusinessDictionary, businessdictionary.com/definition/metadata.html, accessed March 13, 2020, accessed March 18, 2020



                                                                  Understanding the forensic technology landscape | 40
   39   40   41   42   43   44   45   46   47   48   49