Page 44 - Understandinging Forensic Technology Landscape
P. 44
Electronically stored information (ESI): As referenced associated with creating, using, and sharing enterprise
in the United States Federal Rules of Civil Procedure, information. It recognizes that information is an
information that is stored electronically, regardless of organizational asset and as such requires high-level
the media or whether it is in the original format in which coordination and oversight to assure accountability,
it was created, as opposed to being stored in hard copy integrity, appropriate preservation, and protection of
(that is, on paper). enterprise information.
53
File hashing: This is the process of an algorithm that Link analysis: Data analysis used in network theory,
calculates a fixed-size bit string value from a file. A file used to evaluate the relationships or connections
basically contains blocks of data. Hashing transforms between network nodes. These relationships can be
this data into a far shorter fixed-length value or key between various types of objects (nodes), including
which represents the original string. Since two identical people, organizations and even transactions.
50
54
files will have the same hash, file hashing provides a
means to prove whether or not the files are identical or LNK: Shortcut files — or those ending in the “.lnk”
different. extension — are Windows files that link easy-to-recognize
icons to specific executable programs, and are typically
GDPR: General Data Protection Regulation (GDPR) is a placed on the user’s Desktop or Start Menu.
55
legal framework that sets guidelines for the collection
and processing of personal information from individuals Machine learning (ML): A method of data analysis that
who live in the European Union (EU). automates analytical model building. It is a branch of
51
AI based on the idea that systems can learn from data,
Hash values: Numeric values that can be thought of as identify patterns and make decisions with minimal
fingerprints for files. The contents of a file are processed human intervention.
56
through a cryptographic algorithm, and a unique
32-character alphanumeric value — the hash value — Macro: A single instruction that expands automatically
is produced that identifies the contents of the file. If into a set of instructions to perform a particular task.
the contents are modified in any way, the value of the Metadata: Data that serves to provide context or
hash will also change significantly. Two algorithms are additional information about other data. For example,
currently widely used to produce hash values: the MD5 information about the title, subject, author, typeface,
and SHA1 algorithms. enhancements, and size of the data file of a document
HIPAA: Health Insurance Portability and Accountability constitute metadata about that document. It may also
Act of 1996 (HIPAA) is United States legislation that describe the conditions under which the data stored in a
provides data privacy and security provisions for database was acquired, its accuracy, date, time, method
57
safeguarding medical information. of compilation and processing, and the like.
52
Information governance (IG): A strategic approach Natural language processing (NLP): Technology that
to maximizing the value while mitigating the risks helps computers understand, interpret and manipulate
human language.
50 Introduction to Hashing and its uses, 2BrightSparks, 2brightsparks.com/.../introduction-to-hashing-and-its-uses.html, accessed March 9, 2020
51 General Data Protection Regulation (GDPR), Investopedia, investopedia.com/terms/g/general-data-protection-regulation-gdpr.asp, accessed March 9, 2020
52 Summary of the HIPAA Privacy Rule, HHS.gov, hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html, accessed March 9, 2020
53 Information Governance FAQs, AHIMA, ahima.org/topics/infogovernance/faqs?tabid=faq, accessed September 4, 2019
54 Link Analysis, techopedia, techopedia.com/definition/30336/link-analysis, accessed, March 11, 2020
55 KrebsonSecurity, Sept 2019 Edition, krebsonsecurity.com/tag/lnk/, accessed on February 20, 2020, accessed March 9, 2020
56 A guide to machine learning algorithms and their applications, SAS, sas.com/en_us/insights/articles/analytics/machine-learning-algorithms-guide.html, accessed March 9, 2020
57 Metadata, BusinessDictionary, businessdictionary.com/definition/metadata.html, accessed March 13, 2020, accessed March 18, 2020
Understanding the forensic technology landscape | 40