Vocabulary

VOCABULARY (In order from beginning of chapter to end)


 * LIMS (Laboratory Information Management Systems):** A database used for handling evidence


 * Syntactic Approach (FP):** The ridge patterns and minutiae are approximated by a string of primitaves.


 * Structural Approach (FP):** Features based on minutiae are extracted and then represented using a graph data structure. Use of the topology of the features does the matching.


 * Neural Networks Approach (FP):** A feature vector is constructed and classified by a nueral network classifer.


 * Statistical Classifers Approach (FP):** Statistical classifers are used instead of neural network classifiers.


 * Fish System:** The oldest system used for handwriting detecting. Upper and lower loops are analyzed, if available.


 * Script system:** Handwriting system that measures interline distance and the interword distance.


 * DRUGFIRE and IBIS:** Databases that can be used for acquiring, storing, and analyzing images of bullets and cartridge cases.


 * Sequential Switchers:** Cameras are recorded on the videotape in a sequential method.


 * Multiplexers:** Cameras are recorded on the tape often in fields.


 * Quad Compressors:** The oldest system, in which the image is divided into three parts and each part will cover another camera.


 * Hackers:** People who attack networks.


 * Medline:** Very useful for finding information on forensic medicine.

_________________________________________________________________________________________________________________________________
 * The Chemical Abstracts (CAS):** The first database used for chemical questions.

computer crime scene- the moment the vision conjured up by the notion of one (or more) computers attacking one (or more) computers over some medium

cyber forensics- the extraction of evidence that particular digital data passed over some medium between two points in a network



hacking- unauthorized access or attempts to access computer assets

Intrusion Management- functional or operational model for describing the information process

platters- disks for hard drives

fragmented disks- do not preform as well as unfragmented disks because the read heads must jump from cluster to cluster in stead of tracking sequentially through contiguous clusters

slack space- empty space

swap files- potential bonanza for forensic investigators. two kinds: 1. temporary 2. perminant

unallocated space- space not occupied

encrypted evidence- hidden files