Front | Back |
is a form of crime where the Internet or computers are used as a medium to commit crime
|
Computer crime
|
is the security policy that determines the actions that an organization will take following a confirmed or potential security breach
|
IRP Incident Response Policy
|
is the first experienced person to arrive on an incident scene
|
First Responders
|
The restoration of backup files, reprocessing transactions, and auditing the system to return the system to operating condition
|
Recovery
|
Response to a computer crime-related situation based on criticality
Informing management of the incident and suggesting the next best
|
Triage
|
Course of action to reduce the possibility of future events from occurring
|
Debriefing and feedback
|
Determination of events and assessment by an
|
incident response team
|
Identification, examination, and inspection of a problem by either an internal response team or local law enforcement
|
Incident response and handling
|
Securing the scene of the incident as to not damage evidence
|
Investigative
|
refers to the chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of evidence, physical or electronic
|
Chain of custody
|
Evidence that is gathered from multiple sources that can support other types of evidence in a court of law
|
Corroborative
|
Evidence that is required to be admissible in a court of law
|
Best
|
Evidence that is permanent and cannot be disputed
|
Conclusive
|
Evidence that is gathered from multiple sources to infer a conclusion in a court of law
|
Circumstantial
|
Evidence that is a copy of an original document
|
Secondary
|