Part of the Security management glossary:

Forensic, in a general sense, means "related to or used in courts of law" or "used for formal public debate or discussion."" The word is used in several ways in information technology, including:

  • network forensics : the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents.
  • computer forensics : (also called cyberforensics) the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law
  • forensic animation : the use of full-motion computer graphics to recreate an event such as an automobile accident, the collapse of a building, an assault, or the workings of a mechanical device from a variety of perspectives
  • forensic watermark : (also called a digital watermark) a sequence of characters or code embedded in a digital document, image, video or computer program to uniquely identify its originator and authorized user.

This was last updated in September 2007
Posted by: Margaret Rouse

Related Terms

Definitions

  • virtual honeypot

    - A virtual honeypot is software that emulates a vulnerable system or network to attract intruders and study their behavior. Virtual honeypots contrast with hardware-based honeypots, which are dedica... (WhatIs.com)

  • vulnerability

    - A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an endpoint or network. Vulnerabilities create possible attac... (WhatIs.com)

  • vulnerability management planning

    - Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in ... (WhatIs.com)

Glossaries

  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.