e-discovery
Cybercrime
Spreadsheets
Miscellaneous
Files
100
The people who possess ESI that might be relevant to the case.
Who are custodians?
100
A destructive program disguised as a real program. When the user runs the program, this can capture information such as passwords or enable someone to remotely control your computer.
What is a Trojan horse?
100
This program is commonly used to work with spreadsheets.
What is Microsoft Excel?
100
A computer that has every component within the same case as the monitor, except for peripheral components like the keyboard and mouse.
What is an all-in-one desktop computer?
100
Adobe reader allows you to view this kind of file.
What is PDF?
200
A memo we send to inform the client (or its employees) that documents must be preserved because they might be needed in the litigation.
What is a litigation hold memo? (document hold memo)
200
A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
What is a backdoor?
200
See image 1.
What is a column?
200
This protective device provides a stable current flow and minimizes the chances of an overvoltage reaching your computer.
What is a surge protector?
200
.doc, .xls, and .ppt are examples of these.
What are file extensions?
300
An identification system used in discovery in which each page of every document produced receives a unique number.
What is Bates numbering?
300
A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.
What is a botnet?
300
See image 2.
What is a row?
300
Another name for a laptop computer.
What is a notebook computer?
300
TIFF stands for this.
What is tagged image file format?
400
The information about how a file travels from its original version to the version that is produced, including who had custody at each step.
What is chain of custody?
400
A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information to some outside source while the user is online.
What is spyware?
400
See image 3.
What is a function or formula?
400
A filtering program that stops pop-up ads from displaying on webpages.
What is a pop-up blocker?
400
C:\Users\Owner\Documents is an example of one of these.
What is a file path?
500
This is a "fingerprint" for a digital file. It changes if you alter the file, even in a small way.
What is an MD5 hash value?
500
This "non-technical" method of intrusion relies on manipulating people to give up confidential information. It takes advantage of people's trusting nature and naivete.
What is social engineering?
500
See image 4.
What is a sheet?
500
A tool that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster.
What is a disk defragmenter?
500
The process of packaging a file or files to use less disk space.
What is file compression?