Page 45 - Understandinging Forensic Technology Landscape
P. 45

Network graphing: (see Link analysis)                Script: An automated series of instructions carried out in
                                                                a specific order.
           Optical character recognition (OCR): The use of
           technology to distinguish printed or handwritten text   SMS, MMS messages: SMS stands for Short Message
           characters inside digital images of physical documents,   Service and is the most widely used type of text
           such as a scanned paper document.                    messaging. With a SMS, you can send a message of up
                                                                to 160 characters to another device. Longer messages
           Open-source intelligence (OSINT): Describes a        are normally split up into multiple messages. MMS
           variety of tools and approaches to investigating the   stands for Multimedia Messaging Service. With an MMS,
           backgrounds of corporate entities and individuals    you can send a message including pictures, video or
           leveraging publicly available data                   audio content to another device.
                                                                                            62
           Predictive coding: A technology-assisted review process   SOC auditing: SOC for Service Organizations reports
           involving the use of ML or algorithmic approaches to   are designed to help service organizations that provide
           distinguish relevant from non-relevant documents.
                                                       58
                                                                services to other entities, build trust and confidence
           Private blockchain (centralized): A permissioned     in the service performed and controls related to the
           blockchain that works based on access controls that   services through a report by an independent CPA. Each
           restrict the people who can participate in the network.    type of SOC for Service Organizations report is designed
                                                          59
                                                                to help service organizations meet specific user needs:
           Public blockchain (fully decentralized): A           •   SOC 1  — SOC for Service Organization: ICFR — Report
                                                                       ®
           permissionless blockchain in which anyone can join     on Controls at a Service Organization Relevant to User
           the network and read, write, or participate within the   Entities’ Internal Control over Financial Reporting
           blockchain.
                     60
                                                                •   SOC 2  — SOC for Service Organizations: Trust
                                                                       ®
           Query/querying: A set of instructions the database     Services Criteria — Report on Controls at a Service
           software follows to perform certain actions on the data   Organization Relevant to Security, Availability,
           contained in the database.                             Processing Integrity, Confidentiality or Privacy

                                                                       ®
           Seed set: A collection of pre-categorized documents   •   SOC 3  — SOC for Service Organizations: Trust
           that is used as the initial training for a predictive coding   Services Criteria for General Use Report
           system or the initial training set provided to the learning   Structured data: Data that have been created and
           algorithm in an active learning process.
                                                                formatted according to a defined model, and stored in a
           Semi-structured data: A data set that contains       repository (such as a database), in a manner that allows
           some mix of structures and unstructured elements.    further analysis. Examples are tables that contain dates,
           Semi-structured data typically maintains internal tags   phone numbers, ZIP codes, Social Security numbers
           and markings that identify separate data elements,   and names.
           which enables information grouping and hierarchies.
                                                         61




            58   Predictive Coding Technologies and Protocols: Overview and Survey, Complex Discovery, complexdiscovery.com/predictive-coding-technologies-and-protocols-overview-and-survey/,
             accessed March 18, 2020
            59   Public vs. Private Blockchain: A Comprehensive Comparison, Blockchain Council, blockchain-council.org/blockchain/public-vs-private-blockchain-a-comprehensive-comparison/,
             accessed March 9, 2020
            60  See footnote 56
            61  Structured v. Unstructured Data, Datamation, datamation.com/big-data/structured-vs-unstructured-data.html, accessed September 4, 2019
            62   What’s the difference between SMS and MMS?, Twigby, twigby.zendesk.com/hc/en-us/articles/115010624828-What-s-the-difference-between-SMS-and-MMS-, accessed
             February 20, 2020, accessed March 9, 2020



                                                                  Understanding the forensic technology landscape | 41
   40   41   42   43   44   45   46   47   48   49