Contemporaneous Notes - Detailed notes take in real time or immediately after the event. , Autopsy - Open source software used to analyse all times of digital devices. , BYOD - Bring your own device, Chain of Custody - documentation that records the sequence of custody, control, transfer, analysis and location of electronic evidence, Decryption - Process of using a decryption key to make encrypted data readable, Digital device - any electronic device that stores digital data, Disclosure - The legal requirement for the prosecution to tell the defence what evidence on a case. , Data Breach - Unathorised access to and the theft of sensitive data ie customer information intellectual property or employee records. , Phishing - : Cybercriminals use deceptive emails, messages, or links to websites to trick individuals into providing sensitive information ie username, passwords or financial details, Ransomware - malware that encrypts files on a victim’s system, rendering them inaccessible. Cybercriminals then demand a ransom in exchange for the decryption key. then demand a ransom,then demand a ransom, then demand a ransom,, Social Engineering - Cybercriminals manipulate individuals into divulging confidential information or performing actions that compromise security.  , Pretexting, baiting or quid pro quo tactics  - Types of Social Engineering. , Email compromise - Cyber criminals gain access to email account and use it to impersonate individual to trick people into giving them money, sensitive information etc., Viruses, worms and trojans - Types of Malware, IOT Attack - Cybercriminals exploit vulnerabilities in connected devices to gain unauthorised access to business networks or launch attacks., Encryption - information is converted into a secret code using a mathematical algorithm that makes it unreadable. , Distributed Denial of Service Attack - online services are overwhelmed with traffic. This causes downtime, loss of revenue, damage to company reputation. , Symmetrical encryption - Uses the same key for encryption and decryption. , Types of symmetrical encryption - Advanced Encryption Standard (AES), Data Encryption Standard (DES), Asymmetric encryption - uses a key pair - different key for encryption and decryption. , Types of asymmetric encryption - Elliptic curve cryptography (EEC) Rivest Cipher 4 (RC4), Exploit - Software or data that takes advantage of a vulnerability in a system., Firewall - Network security device that monitors and filters incoming and outgoing network traffic based on a predefined set of rules , Authentication - Process of verifying a users identity ensuring they are who they claim to be., Access control - a way of restricting access to resources based on users roles and permissions, Endpoint Protection - Technologies and strategies for securing devices like laptops, mobile phones and servers that connect to a network., Vulnerability - A weakness of flaw in a system, software or hardware that can be exploited by attackers, Access Control List - a list of rules that grant or deny access to files and/or directories., Data Protection Act 2018 - Controls how your personal information is used, stored and processed by an organisation. , Computer Misuse Act 1990 - Legislation that sets out how to secure computer systems and materials against unathorised access or modification.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?