MSAB Digital Forensics Glossary

Termes clés et definitions

 

Bienvenue dans notre glossaire de forensique numérique – Une ressource pour des définitions claires et concises des termes clés utilisés dans les enquêtes de forensique numérique. Ce glossaire comprend la terminologie utilisée dans le domaine des enquêtes sur les smartphones, de l’extraction de données mobiles et de l’analyse de preuves numériques provenant d’appareils mobiles.

Les téléphones portables devenant un élément central de la cybercriminalité et des enquêtes numériques, il est essentiel de comprendre des concepts essentiels tels que l’IMEI, l’acquisition de données mobiles, les artefacts d’applications et l’analyse de la carte SIM. Vous trouverez également des définitions de termes de criminalistique numérique plus généraux tels que les valeurs de hachage, les métadonnées et la chaîne de possession, le tout expliqué dans un format simple et accessible. Que vous soyez un spécialiste de la criminalistique mobile, un agent des forces de l’ordre, un professionnel de la cybersécurité ou un étudiant, ce glossaire offre des explications actualisées pour vous aider à naviguer dans le domaine en évolution rapide de la criminalistique mobile.

Backdoor

A hidden method of bypassing security or authentication in a system, often installed by malware to grant attackers’ future access.

Read full term

Backup

A copy of digital data stored separately from the original, used for recovery in case of data loss. In digital forensics, backups such as an Android Backup can be crucial sources of evidence.

Read full term

Base64 Encoding

A method for converting binary data into ASCII text. Often used in data obfuscation, email attachments, and forensic analysis of malware.

Read full term

BFU (Before First Unlock)

Refers to a device state, the device has been turned off and no passcode/password has been entered by the user. This state leaves the file system encrypted, software such as XRY Pro can still successfully brute force and decrypt the file system for an extraction dependent on device make and model.   BFU, or Before […]

Read full term

Biome

A biome is a collection of variables and settings that have common characteristics due to similar environments and can be found across a range of applications on iOS.

Read full term

Biometric Unlock Forensics

Biometric unlock forensics is a subdiscipline of mobile forensics that focuses on investigating and analyzing biometric authentication methods, such as fingerprint, face, and iris recognition, used to secure mobile devices. As biometric unlocking becomes increasingly common, forensic investigators must understand how these technologies work and develop techniques to bypass or exploit them when necessary.   […]

Read full term

BIOS (Basic Input/Output System)

Firmware stored on a motherboard chip that initializes hardware during boot and provides runtime services for operating systems in computers.

Read full term

Bit

The smallest unit of digital information (a binary digit, 0 or 1).

Read full term

Bit-by-Bit Copy

An exact duplicate of a storage medium (all bytes copied exactly), also known as a forensic clone or image.

Read full term

BitLocker

A full-disk encryption feature built into Microsoft Windows. Forensic investigators may need to bypass or decrypt BitLocker to access evidence.

Read full term

Blockchain Forensics

The application of digital forensics to blockchain and cryptocurrency transactions, including tracing illicit transactions and wallet analysis.

Read full term

Bluetooth forensics

Bluetooth forensics is a branch of digital forensics that focuses on investigating wireless data transfer and communication between devices using Bluetooth technology. As Bluetooth-enabled devices become increasingly prevalent, understanding how to acquire and analyze data transmitted via Bluetooth is crucial for digital forensic investigators.   Bluetooth Technology Overview Bluetooth is a short-range wireless communication technology […]

Read full term

Boot Loader

A program that loads an operating system when a device is turned on; unlocking a mobile device’s bootloader allows installation of custom OS or forensic boot images. Normally this small piece of code is loaded into RAM during the device start up process. This method allows for a forensically sound method of obtaining access to […]

Read full term

Boot Sector

The section of a storage drive containing code to start the boot process for computers (e.g., Master Boot Record on traditional BIOS systems).

Read full term

Botnet

A network of compromised computers (bots) controlled by an attacker, used together to perform large-scale tasks like DDoS attacks or sending spam.

Read full term

Brick/ed

Term used to indicate a process that has caused a device to malfunction and become nonresponsive. Processes that could cause this could be flashing or other methods that have now caused the device to be inaccessible.

Read full term

Brute Force Attack

A trial-and-error method used to crack passwords or encryption by systematically trying many possible combinations.

Read full term

BSSID (Basic Service Set Identifiers)

The BSSID is the MAC address (Media Access Control address) of a wireless access point (AP) in a Wi-Fi network. It uniquely identifies a specific access point within a wireless network.

Read full term

BYOD (Bring Your Own Device)

An organizational practice allowing employees to use personal devices (computers, smartphones, etc.) for work purposes, which can complicate investigations due to mixed personal and work data.   BYOD forensics involves investigating personally-owned devices, such as smartphones, tablets, and laptops, that are used for work purposes in corporate environments. As BYOD policies become more common, digital […]

Read full term

Bypass Lock Screen

A method used by Forensic tools such as XRY and XRY Pro allows a user to gain access to a mobile device by bypassing the lock screen.

Read full term

Byte

A group of 8 bits; a basic unit of data representing a single character in text (e.g., one letter is typically one byte in ASCII).

Read full term