MSAB Digital Forensics Glossary
Termes clés et definitions
Bienvenue dans notre glossaire de forensique numérique – Une ressource pour des définitions claires et concises des termes clés utilisés dans les enquêtes de forensique numérique. Ce glossaire comprend la terminologie utilisée dans le domaine des enquêtes sur les smartphones, de l’extraction de données mobiles et de l’analyse de preuves numériques provenant d’appareils mobiles.
Les téléphones portables devenant un élément central de la cybercriminalité et des enquêtes numériques, il est essentiel de comprendre des concepts essentiels tels que l’IMEI, l’acquisition de données mobiles, les artefacts d’applications et l’analyse de la carte SIM. Vous trouverez également des définitions de termes de criminalistique numérique plus généraux tels que les valeurs de hachage, les métadonnées et la chaîne de possession, le tout expliqué dans un format simple et accessible. Que vous soyez un spécialiste de la criminalistique mobile, un agent des forces de l’ordre, un professionnel de la cybersécurité ou un étudiant, ce glossaire offre des explications actualisées pour vous aider à naviguer dans le domaine en évolution rapide de la criminalistique mobile.
Backdoor
A hidden method of bypassing security or authentication in a system, often installed by malware to grant attackers’ future access.
Read full termBackup
A copy of digital data stored separately from the original, used for recovery in case of data loss. In digital forensics, backups such as an Android Backup can be crucial sources of evidence.
Read full termBase64 Encoding
A method for converting binary data into ASCII text. Often used in data obfuscation, email attachments, and forensic analysis of malware.
Read full termBFU (Before First Unlock)
Refers to a device state, the device has been turned off and no passcode/password has been entered by the user. This state leaves the file system encrypted, software such as XRY Pro can still successfully brute force and decrypt the file system for an extraction dependent on device make and model. BFU, or Before […]
Read full termBiome
A biome is a collection of variables and settings that have common characteristics due to similar environments and can be found across a range of applications on iOS.
Read full termBiometric Unlock Forensics
Biometric unlock forensics is a subdiscipline of mobile forensics that focuses on investigating and analyzing biometric authentication methods, such as fingerprint, face, and iris recognition, used to secure mobile devices. As biometric unlocking becomes increasingly common, forensic investigators must understand how these technologies work and develop techniques to bypass or exploit them when necessary. […]
Read full termBIOS (Basic Input/Output System)
Firmware stored on a motherboard chip that initializes hardware during boot and provides runtime services for operating systems in computers.
Read full termBit-by-Bit Copy
An exact duplicate of a storage medium (all bytes copied exactly), also known as a forensic clone or image.
Read full termBitLocker
A full-disk encryption feature built into Microsoft Windows. Forensic investigators may need to bypass or decrypt BitLocker to access evidence.
Read full termBlockchain Forensics
The application of digital forensics to blockchain and cryptocurrency transactions, including tracing illicit transactions and wallet analysis.
Read full termBluetooth forensics
Bluetooth forensics is a branch of digital forensics that focuses on investigating wireless data transfer and communication between devices using Bluetooth technology. As Bluetooth-enabled devices become increasingly prevalent, understanding how to acquire and analyze data transmitted via Bluetooth is crucial for digital forensic investigators. Bluetooth Technology Overview Bluetooth is a short-range wireless communication technology […]
Read full termBoot Loader
A program that loads an operating system when a device is turned on; unlocking a mobile device’s bootloader allows installation of custom OS or forensic boot images. Normally this small piece of code is loaded into RAM during the device start up process. This method allows for a forensically sound method of obtaining access to […]
Read full termBoot Sector
The section of a storage drive containing code to start the boot process for computers (e.g., Master Boot Record on traditional BIOS systems).
Read full termBotnet
A network of compromised computers (bots) controlled by an attacker, used together to perform large-scale tasks like DDoS attacks or sending spam.
Read full termBrick/ed
Term used to indicate a process that has caused a device to malfunction and become nonresponsive. Processes that could cause this could be flashing or other methods that have now caused the device to be inaccessible.
Read full termBrute Force Attack
A trial-and-error method used to crack passwords or encryption by systematically trying many possible combinations.
Read full termBSSID (Basic Service Set Identifiers)
The BSSID is the MAC address (Media Access Control address) of a wireless access point (AP) in a Wi-Fi network. It uniquely identifies a specific access point within a wireless network.
Read full termBYOD (Bring Your Own Device)
An organizational practice allowing employees to use personal devices (computers, smartphones, etc.) for work purposes, which can complicate investigations due to mixed personal and work data. BYOD forensics involves investigating personally-owned devices, such as smartphones, tablets, and laptops, that are used for work purposes in corporate environments. As BYOD policies become more common, digital […]
Read full termBypass Lock Screen
A method used by Forensic tools such as XRY and XRY Pro allows a user to gain access to a mobile device by bypassing the lock screen.
Read full termByte
A group of 8 bits; a basic unit of data representing a single character in text (e.g., one letter is typically one byte in ASCII).
Read full term