Skip to main content
Completion requirements

Definitions and Descriptions.


Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  (Next)
  ALL

C

Chain of Custody

A chain of custody refers to the documentation and tracking of evidence in a criminal investigation or legal case. It is a record of the handling and movement of evidence from the time it is collected until it is presented in court.

The chain of custody is important because it helps to establish the authenticity and integrity of the evidence. It ensures that the evidence has not been tampered with or contaminated and that it can be accurately linked to the crime or legal matter in question.

Examples of evidence that may require a chain of custody include physical items like fingerprints, DNA samples, drugs, weapons, or documents. It is also necessary for digital evidence like emails, texts, or social media posts.

To maintain a chain of custody, the following steps must be followed:

    • Evidence is collected by a trained and authorized individual, such as a police officer or forensic investigator.
    • The evidence is properly packaged and labeled, including information about who collected it, where and when it was collected, and what it is.
    • The evidence is transferred to a secure location, such as a police station or laboratory, where it is stored in a controlled environment to prevent tampering or contamination.
    • The evidence is examined and analyzed by qualified professionals using established protocols and procedures.
    • The results of the examination are documented and reported in a detailed and accurate manner.
    • The evidence is securely transported to court when it is needed as part of a legal case.

Throughout the process, the chain of custody is carefully documented and tracked, including information about who handled the evidence, where it was stored, and when it was moved. This helps to ensure that the evidence is reliable and can be used in court to support a criminal conviction or legal ruling.

It is important to maintain a thorough and accurate chain of custody in order to establish the authenticity and reliability of the evidence. Any breaks in the chain of custody, such as evidence being left unsecured or handled by unauthorized personnel, can compromise the integrity of the evidence and potentially impact the outcome of a case.

A chain of custody is a document that outlines the handling and control of physical or digital evidence in a forensic investigation. It is used to maintain the integrity of the evidence and to ensure that it is admissible in court.

In the field of digital forensics and incident response (DFIR), a chain of custody is used to track the handling of digital evidence from the time it is collected until it is presented in court. The chain of custody should include information about who collected the evidence when it was collected, how it was collected, and where it has been stored.

For example, if a forensic analyst collects a suspect's computer as evidence, the chain of custody would include the following information:

    • The date and time the computer was collected
    • The name of the forensic analyst who collected the computer
    • The location where the computer was collected
    • A description of the computer and any identifying information, such as the serial number
    • The steps taken to secure and transport the computer, including any precautions taken to prevent contamination of the evidence
    • The name of the person who received the computer at the forensic laboratory

It is important to maintain a thorough and accurate chain of custody in order to ensure the integrity of the evidence and to establish that it has not been tampered with or altered in any way.

In addition to maintaining a chain of custody, forensic analysts should also follow standard operating procedures (SOPs) in order to ensure that the evidence is handled properly and that the results of the forensic analysis are reliable. SOPs outline the steps that should be taken to collect, preserve, and analyze digital evidence in a consistent and repeatable manner.

Overall, a chain of custody and adherence to SOPs are important for ensuring the integrity and admissibility of digital evidence in a forensic investigation.


Resource:

Preserving the Chain of Custody
Course: CSI Linux Certified OSINT Analyst | CSI Linux Academy
Course: CSI Linux Certified Computer Forensic Investigator | CSI Linux Academy


Competitive Intelligence

Competitive intelligence refers to the collection and analysis of information about competitors, markets, and industry trends in order to inform strategic decision-making and gain a competitive advantage. It can be used by businesses, organizations, and individuals to gather information about their competitors and make informed decisions about their own strategies and actions.

Here are some examples of competitive intelligence:

  1. Market research: This involves gathering and analyzing data about the market and industry, such as sales figures, customer demographics, and trends. This can help businesses understand their competition and identify opportunities for growth or expansion.

  2. Competitive analysis: This involves studying the strategies, products, and services of competitors in order to understand their strengths and weaknesses, and identify opportunities for differentiation or improvement.

  3. SWOT analysis: This is a tool used to assess the internal and external factors that can impact an organization, including its strengths, weaknesses, opportunities, and threats. This can help businesses identify their competitive advantage and identify areas for improvement.

  4. Benchmarking: This involves comparing the performance of a company or organization to that of its competitors, in order to identify areas of strength and weakness and identify areas for improvement.

Overall, competitive intelligence helps businesses and organizations gather and analyze data about their competitors in order to inform strategic decision-making and gain a competitive advantage



Covert Channel

A covert channel is a type of communication method which allows for the transfer of data by exploiting resources that are commonly available on a computer system. Covert channels are types of communication that are invisible to the eyes of the system administrators or other authorized users. Covert channels are within a computer or network system, but are not legitimate or sanctioned forms of communication. They may be used to transfer data in a clandestine fashion.

Examples of covert channels include:

    • Embedding data in the headers of packets - The covert data is embedded in the headers of normal packets and sent over a protocol related to the normal activities of the computer system in question.
    • Data piggybacked on applications - Malicious applications are piggybacked with legitimate applications used on the computer system, sending confidential data.
    • Time-based channel - The timing of certain actions or transmissions is used to encode data.
    • Covert storage channel - Data is stored within a computer system on disk or in memory and is hidden from the system's administrators.
    • Data diddling - This involves manipulating data to contain malicious code or messages.
    • Steganography - This is a process of hiding messages within other types of media such as images and audio files.

Covert channels are commonly used for malicious purposes, such as the transmission of sensitive data or the execution of malicious code on a computer system. They can also be used for legitimate purposes, however, such as creating an encrypted communication channel.

Resource:

Shadows and Signals: Unveiling the Hidden World of Covert Channels in Cybersecurity
Course: CSI Linux Certified Dark Web Investigator | CSI Linux Academy
Course: CSI Linux Certified Covert Comms Specialist (CSIL-C3S) | CSI Linux Academy


Crime as a Service

Crime as a service (CaaS) is a term used to describe the practice of selling illegal or malicious products or services online. These products and services can include things such as malware, stolen personal information, and tools for committing cybercrimes.

One example of CaaS is the sale of malware-as-a-service (Maas). Maas refers to the sale of malware or tools for creating malware, often with the added convenience of technical support and updates. This allows individuals or organizations to purchase and use malware without having the technical knowledge or resources to create it themselves.

Another example of CaaS is the sale of stolen personal information, such as credit card numbers or login credentials. This information can be used for identity theft or other fraudulent activities.

CaaS can also include the sale of tools or services for committing cybercrimes, such as distributed denial of service (DDoS) attacks or phishing campaigns. These tools can be used to disrupt or compromise websites or steal sensitive information from individuals or organizations.

Overall, CaaS is a growing concern for law enforcement agencies, as it allows individuals or organizations to access and use illegal or malicious products and services without having to have the necessary knowledge or resources. It is important for individuals and organizations to be aware of the potential risks of CaaS and take steps to protect themselves from these types of threats.


Keywords:
- Crime-as-a-Service (CaaS)
- Malware-as-a-Service (MaaS)
- Ransomware-as-a-Service (RaaS)


Cross Contamination

Cross contamination of evidence refers to the transfer of physical evidence from one source to another, potentially contaminating or altering the integrity of the original evidence. This can occur through a variety of means, including handling, storage, or transport of the evidence.

Examples of cross contamination of evidence may include:

  1. Handling evidence without proper protective gear or technique: For example, an investigator may handle a piece of evidence without wearing gloves, potentially transferring their own DNA or other contaminants onto the evidence.

  2. Storing evidence improperly: If evidence is not properly sealed or stored, it may come into contact with other substances or materials, potentially contaminating it.

  3. Transporting evidence without proper precautions: During transport, evidence may come into contact with other objects or substances, potentially altering or contaminating it.

  4. Using contaminated tools or equipment: If an investigator uses a tool or equipment that has previously come into contact with other evidence, it may transfer contaminants to the current evidence being analyzed.

It is important to prevent cross contamination of evidence in order to maintain the integrity and reliability of the evidence being used in a case. This can be achieved through proper handling, storage, and transport of evidence, as well as using clean tools and equipment.

Cross contamination of digital evidence refers to the unintentional introduction of external data or contamination of the original data during the process of collecting, handling, and analyzing digital evidence. This can occur when different devices or storage media are used to handle or store the evidence, or when the original data is modified or altered in any way.

One example of cross contamination of digital evidence is when a forensic investigator uses the same device to collect evidence from multiple sources. If the device is not properly sanitized between uses, the data from one source could be mixed with data from another source, making it difficult to accurately determine the origin of the data.

Another example of cross contamination of digital evidence is when an investigator copies data from a device to a storage media, such as a USB drive or hard drive, without properly sanitizing the storage media first. If the storage media contains data from previous cases, it could mix with the new data and contaminate the original evidence.

Cross contamination of digital evidence can also occur when an investigator opens or accesses a file or device without taking proper precautions, such as making a copy of the original data or using a forensic tool to preserve the data. This can result in the original data being modified or altered, which could affect the authenticity and integrity of the evidence.

In summary, cross contamination of digital evidence is a significant concern in forensic investigations because it can compromise the reliability and accuracy of the evidence, potentially leading to false conclusions or incorrect results. It is important for forensic investigators to take proper precautions to prevent cross contamination, such as using proper forensic tools and techniques, sanitizing devices and storage media, and following established protocols and procedures.



Crown Jewel Analysis

Threat hunting crown jewel analysis is a method used by security professionals to identify and prioritize the most valuable and vulnerable assets within an organization. This analysis helps security teams understand which assets are most critical to the organization and therefore require the most protection, and which assets are most likely to be targeted by adversaries.

To conduct crown jewel analysis, security professionals will typically gather information about the organization's assets, including their value to the organization, their level of vulnerability, and the potential impact of a compromise. They will then rank these assets based on these factors, with the most valuable and vulnerable assets being identified as the "crown jewels" of the organization.

For example, consider a healthcare organization that stores sensitive patient data. The organization's crown jewels might include their electronic health record system, which contains all of the patient data, and their server infrastructure, which stores and processes the data. These assets are likely to be the most valuable and vulnerable to an adversary, and therefore require the most protection.

Once the crown jewels have been identified, security professionals can focus their threat hunting efforts on protecting these assets, looking for indicators of compromise and taking steps to prevent attacks. This may include implementing additional security measures, such as firewalls and intrusion detection systems, or implementing robust access control policies. By prioritizing the protection of the organization's most valuable assets, security teams can better defend against threats and reduce the risk of a compromise.



Cryptocurrency Investigation

Investigating Cryptocurrency Transactions

Cryptocurrencies, such as Bitcoin, have gained popularity in recent years as a decentralized and anonymous way to transact online. While they offer many benefits, they also present unique challenges for law enforcement and other organizations tasked with investigating suspicious activity.

One of the main challenges of investigating cryptocurrency transactions is the anonymity of the transactions. Cryptocurrencies are designed to be decentralized and not controlled by any central authority, which means there is no central ledger or record of transactions. Instead, transactions are recorded on a decentralized ledger called the blockchain, which is maintained by a network of computers around the world.

While this anonymity can make it difficult to track the movements of individual transactions, there are still several ways to investigate cryptocurrency transactions. One method is to follow the money. Cryptocurrencies can be traced through the blockchain by following the path of the coins from one address to another. This can help investigators identify the source and destination of a transaction, as well as any intermediaries involved.

Another way to investigate cryptocurrency transactions is to look for patterns or anomalies in the transaction data. For example, an investigator might look for large or unusual transactions, or transactions that involve multiple addresses or entities. These could be indicators of illicit activity, such as money laundering or fraud.

Investigators can also use other tools and techniques to help trace cryptocurrency transactions. For example, they might use forensic tools to examine the blockchain and identify specific transactions or addresses. They might also use social media and other online sources to gather information about the individuals or entities involved in the transactions.

Finally, investigators can work with exchanges and other service providers that handle cryptocurrency transactions. Many exchanges and service providers are required to follow anti-money laundering (AML) and know your customer (KYC) regulations, which means they may have additional information about the parties involved in a transaction.

In conclusion, investigating cryptocurrency transactions can be a challenging task due to the anonymity of the transactions. However, by following the money, looking for patterns and anomalies, and using forensic tools and other sources of information, investigators can still effectively trace and identify suspicious activity.



CSAM

CSAM stands for child sexual abuse material. It refers to any type of sexually explicit content that involves minors (individuals under the age of 18). This can include photographs, videos, and other forms of media that depict sexual acts or sexual abuse of children.

CSAM is a serious and illegal offense in many countries, as it involves the exploitation and abuse of vulnerable individuals. It is often associated with other crimes, such as human trafficking and exploitation, and is often linked to organized crime networks.

Here are some examples of CSAM:

  1. Child pornography: This refers to any sexually explicit images or videos that depict children in a sexual manner. This includes photographs, videos, and other forms of media that show children engaging in sexual activity or being sexually exploited.

  2. Online sexual grooming: This refers to the process of manipulating a child or young person into sexual activity, often through online communication or social media. This can involve sending sexually explicit messages, sharing inappropriate images or videos, or attempting to arrange in-person meetings for sexual purposes.

  3. Sex tourism: This refers to individuals traveling to other countries for the purpose of engaging in sexual activity with minors. This can include individuals who engage in sexual exploitation or abuse of children while traveling abroad.

Overall, CSAM is a serious and illegal offense that involves the sexual exploitation and abuse of minors. It is important for individuals to be aware of the signs and risks of CSAM, and to report any suspected instances to the appropriate authorities



Cyber Kill Chain

The cyber kill chain is a cybersecurity concept developed by Lockheed Martin to describe the stages or steps of a cyber attack. It is used to increase awareness of the common tactics, techniques, and procedures used in cyber attacks. 

The cyber kill chain acknowledges that most attacks require multiple stages to complete. By understanding the stages of an attack, organizations can more effectively defend against them by instituting security measures to prevent attacks from occurring, or detecting and preventing breaches when they do happen. 

The cyber kill chain is composed of seven steps or stages, including reconnaissance, weaponization, delivery, exploitation, installation, command & control, and actions on objectives.

1. Reconnaissance: The first step of the kill chain is reconnaissance. This is when the attacker gathers information about the target such as IP addresses, usernames and passwords, open services and ports, or vulnerable software.

2. Weaponization: The second step of the kill chain is weaponization. This is when the attacker takes the information collected in the reconnaissance phase and uses it to craft malicious code, malware, or other attack vectors.

3. Delivery: The third step of the kill chain is delivery. This is when the attacker uses the malicious code, malware, or other attack vectors to deliver the attack payload to the target. Examples of delivery methods are email attachments, malicious links, and USB drives. 

4. Exploitation: The fourth step of the kill chain is exploitation. This is when the attacker takes advantage of weaknesses in the target's security measures or vulnerability in the system and executes the attack, allowing the attacker to gain access to the system. 

5. Installation: The fifth step of the kill chain is installation. This is when the attacker installs malware or backdoors on the target system, allowing the attacker to gain access to the system at a later time. 

6. Command & Control: The sixth step of the kill chain is command & control. This is when the attacker uses the access gained from exploiting the system and sends commands from an external location to the malware or backdoors installed on the system. This allows the attacker to remotely access the system and control it. 

7. Actions on Objectives: The seventh and final step of the kill chain is actions on objectives. This is when the attacker takes advantage of the access gained in the previous steps to carry out the intended attack, such as stealing data or encryption of systems. 

The cyber kill chain is a useful tool for understanding cyber threats and the steps attackers take to mount an attack. Organizations can use the kill chain as an effective way to defend against cyber threats by monitoring and preventing each step in the attack. 

Sources: 

1. https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html 

2. https://www.disruptivesecurity.com/cyber-kill-chain/ 

3. https://www.cisco.com/c/en/us/products/security/cyber-kill-chain.html


Cyber Terrorism

Cyber terrorism refers to the use of digital technology and the internet to carry out acts of terrorism, either through cyber attacks or the dissemination of propaganda or other forms of online radicalization. It is a growing threat that poses serious risks to governments, businesses, and individuals around the world.

Here are some examples of cyber terrorism:

  1. Cyber attacks on government or critical infrastructure: This can include hacking into government or military systems to steal sensitive information or disrupt critical services, such as power plants or transportation systems.

  2. Cyber propaganda: This refers to the use of social media and other online platforms to spread extremist ideologies and recruit individuals to carry out terrorist attacks.

  3. Cyber extortion: This involves threatening to release sensitive information or disrupt services unless a ransom is paid.

  4. Dissemination of false information: This can include spreading false or misleading information online in order to create chaos or panic.

Overall, cyber terrorism represents a significant threat to global security and stability, and it is an area of increasing concern for governments and law enforcement agencies around the world




Page:  1  2  (Next)
  ALL


loader image