1/9
Vocabulary flashcards covering essential concepts of digital forensics, cybercrimes, and types of digital evidence.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computer Forensics
A set of methodical procedures and techniques used to identify, gather, preserve, extract, interpret, document, and present evidence from computer equipment.
Indicators of Compromise (IoC)
Artifacts found on a network or in operating system files that indicate a potential breach or compromise.
Forensic Readiness
Establishing a set of processes and policies to ensure that an organization is prepared to collect and analyze digital evidence when needed.
Espionage
The act of spying to gather secret information.
Intellectual Property Theft
The theft of an organization's proprietary ideas or data.
Trojan Horse
Malware disguised as legitimate software.
Phishing
Frauds aimed at stealing sensitive information by posing as a trustworthy entity in electronic communications.
Locard’s Exchange Principle
The principle stating that anyone entering a crime scene takes something with them and leaves something of themselves behind.
Volatile Data
Information that is lost when power is turned off, such as logged-on users and running processes.
Non-Volatile Data
Information permanently stored on a physical medium, like hard drives and memory cards.