loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  4  5  6  7  8  9  10  ...  40  (Next)
  ALL

6

6LoWPAN

(Last edited: Tuesday, 1 October 2024, 11:08 PM)
6LoWPAN is a communication protocol that enables low-power devices to communicate wirelessly over IPv6 networks. It is commonly used in IoT applications, allowing sensors and other low-power devices to connect to the internet in IIoT and ICS environments.

A

Admissibility

(Last edited: Tuesday, 1 October 2024, 9:42 PM)
Admissibility is a legal standard that determines whether digital evidence is acceptable in court, often based on factors like relevance, authenticity, and how the evidence was obtained.

Advanced Persistent Threat (APT)

(Last edited: Tuesday, 1 October 2024, 10:57 PM)
An Advanced Persistent Threat (APT) is a long-term, targeted cyberattack where an attacker gains unauthorized access to a network and remains undetected for an extended period, typically to steal data or monitor activity.

Adversary-in-the-Middle (AitM)

(Last edited: Tuesday, 1 October 2024, 10:57 PM)
Adversary-in-the-Middle (AitM) is a cyberattack technique where the attacker intercepts and potentially alters communications between two parties without their knowledge, often to steal credentials, inject malicious payloads, or manipulate data.

Adware

(Last edited: Tuesday, 1 October 2024, 10:57 PM)
Adware is a type of software that displays unwanted advertisements on a user's device, often in the form of pop-ups or banners. While not always malicious, adware can degrade system performance and invade user privacy.

Alternate Data Streams (ADS)

(Last edited: Tuesday, 1 October 2024, 10:57 PM)
Alternate Data Streams (ADS) are hidden data within a file that exist alongside the primary data. These streams can be used to conceal information from casual observation, making them important for forensic analysis.

Anonymity

(Last edited: Monday, 7 October 2024, 6:40 PM)

Anonymity is the state of being unknown or unrecognized, particularly in relation to one's identity or location. It is often associated with privacy and the protection of personal information.

There are various ways in which anonymity can be achieved, both online and offline. Some examples include:

  1. Using a pseudonym: A pseudonym is a name that is different from one's legal name. By using a pseudonym, individuals can protect their identity and keep their personal information private. For example, an author may use a pseudonym to publish their work without revealing their real name.

  2. Using a virtual private network (VPN): A VPN is a service that encrypts internet traffic and routes it through a remote server, allowing users to access the internet anonymously. This can be useful for individuals who want to protect their online activity from being monitored or tracked.

  3. Using the Tor network: The Tor network is a system designed to allow anonymous communication. It routes traffic through a series of randomly-selected servers, known as "relays", in order to obscure the identity and location of the user. This can be useful for individuals who want to access content or communicate anonymously.

  4. Wearing a mask or disguise: In some cases, anonymity may be achieved by physically concealing one's identity. For example, protestors may wear masks or disguises in order to protect themselves from retribution or identification.

Overall, anonymity is an important aspect of privacy and can be useful for individuals who wish to protect their personal information or exercise their right to free expression without fear of retribution. However, it is important to note that anonymity can also be used for illegal or malicious purposes, and should be used with caution.



APFS (Apple File System)

(Last edited: Tuesday, 1 October 2024, 9:25 PM)
APFS is a modern file system developed by Apple for macOS, iOS, and other Apple devices. It offers encryption, snapshots, and space sharing, improving performance and reliability.

App Data Extraction

(Last edited: Tuesday, 1 October 2024, 9:27 PM)
App data extraction involves retrieving data from applications installed on mobile devices, such as messaging apps, social media apps, and email clients, to gather evidence in forensic investigations.

APT

(Last edited: Monday, 7 October 2024, 6:40 PM)

Advanced persistent threats (APTs) are a type of cyber attack featuring sophisticated malicious actors that target victims for a long period of time, compromising their system and confidential information. Such attackers usually initiate their attack with a phishing email, initial contact, or social engineering, and then use the access that they gain to continuously probe systems and networks for more access. Once a cybercriminal has access to a system, they may remain for months or even years, siphoning data and compromising other networks, applications, and accounts.

Examples of Advanced Persistent Threats:

  1. Stuxnet: Stuxnet is a computer worm that was initially used in 2010 to target Iran's nuclear weapons program. It gathered information, damaged centrifuges, and spread itself. It was thought to be an attack by a state actor against Iran.
  2. Duqu: Duqu is a computer virus developed by a nation state actor in 2011. It's similar to Stuxnet and it was used to surreptitiously gather information with the goal of infiltrating networks and sabotage their operations.
  3. DarkHotel: DarkHotel is a malware campaign that targeted hotel networks in Asia, Europe and North America in 2014. The attackers broke into hotel Wi-Fi networks and used the connections to infiltrate networks of their guests, who were high profile corporate executives. They stole confidential information from their victims and also installed malicious software on victims' computers.
  4. MiniDuke: MiniDuke is a malicious program from 2013 that is believed to have originated from a state-sponsored group. Its goal is to infiltrate into the target organizations and steal confidential information through a series of malicious tactics.
  5. APT28: APT28 is an advanced persistent threat group that is believed to be sponsored by a nation state. It uses tactics such as spear phishing, malicious website infiltration and password harvesting to target government and commercial organizations.
  6. OGNL: OGNL, or Operation GeNIus Network Leverage, is a malware-focused campaign believed to have been conducted by a nation state actor. It is used to break into networks and steal confidential information, such as credit card numbers, financial records, and social security numbers.


Page:  1  2  3  4  5  6  7  8  9  10  ...  40  (Next)
  ALL