It helps to determine a logical timeline of the security incident and the users who would be responsible.
A steganographic file system is a method to store the files in a way that encrypts and hides the data without the knowledge of others
Data Acquisition is the process of imaging or otherwise obtaining information from a digital device and its peripheral equipment and media
LBA (Logical Block Address) addresses data by allotting a ___________to each sector of the hard disk.
Buffer overflow attacks allow an attacker to modify the _______________in order to control the process execution, crash the process and modify internal variables.
File signature analysis involves collecting information from the __________ of a file to determine the type and function of the file
When a system is compromised, attackers often try to disable auditing, in Windows 7; modifications to the audit policy are recorded as entries of Event ID____________.