MediaWiki API result

This is the HTML representation of the JSON format. HTML is good for debugging, but is unsuitable for application use.

Specify the format parameter to change the output format. To see the non-HTML representation of the JSON format, set format=json.

See the complete documentation, or the API help for more information.

{
    "batchcomplete": "",
    "continue": {
        "lecontinue": "20240519204704|308",
        "continue": "-||"
    },
    "query": {
        "logevents": [
            {
                "logid": 318,
                "ns": 0,
                "title": "Censorship Circumvention",
                "pageid": 315,
                "logpage": 315,
                "revid": 369,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2025-02-11T04:13:04Z",
                "comment": "Created page with \"== Censorship Circumvention ==  '''Censorship circumvention''' refers to the practice of bypassing or circumventing systems, tools, or measures that restrict access to information or limit free expression. These measures are often implemented by governments, corporations, or other entities to suppress or control the flow of information, usually in the form of internet censorship. Censorship circumvention methods allow individuals to access restricted content, communicate...\""
            },
            {
                "logid": 317,
                "ns": 0,
                "title": "Evidence Handling",
                "pageid": 314,
                "logpage": 314,
                "revid": 368,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2024-05-19T21:18:42Z",
                "comment": "Created page with \"== Evidence Handling ==  '''Evidence Handling''' refers to the procedures and practices involved in the collection, preservation, storage, and transportation of physical or digital evidence in legal proceedings, investigations, and forensic analysis. Proper evidence handling is essential for maintaining the integrity, authenticity, and admissibility of evidence in court and ensuring that it remains reliable and credible throughout the legal process.  === Importance ===...\""
            },
            {
                "logid": 316,
                "ns": 0,
                "title": "Chain of Custody",
                "pageid": 313,
                "logpage": 313,
                "revid": 367,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2024-05-19T21:18:33Z",
                "comment": "Created page with \"== Chain of Custody ==  '''Chain of Custody''' (CoC) refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, and analysis of physical or digital evidence in legal proceedings, investigations, and forensic processes. It ensures the integrity, authenticity, and admissibility of evidence by documenting who had possession of the evidence, when, and under what circumstances.  === Importance ===  Chain of Custody is cru...\""
            },
            {
                "logid": 315,
                "ns": 0,
                "title": "Digital Forensics",
                "pageid": 312,
                "logpage": 312,
                "revid": 366,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2024-05-19T21:18:23Z",
                "comment": "Created page with \"== Digital Forensics ==  '''Digital Forensics''', also known as '''cyber forensics''' or '''computer forensics''', is the process of collecting, preserving, analyzing, and presenting digital evidence in support of legal proceedings, investigations, and incident response efforts. It involves the use of specialized techniques, tools, and methodologies to extract and interpret digital evidence from computers, networks, mobile devices, and other digital media.  === Objective...\""
            },
            {
                "logid": 314,
                "ns": 0,
                "title": "Incident Response Plan",
                "pageid": 311,
                "logpage": 311,
                "revid": 365,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2024-05-19T21:12:16Z",
                "comment": "Created page with \"== Incident Response Plan ==  An '''Incident Response Plan''' (IRP) is a predefined set of procedures and guidelines designed to guide an organization's response to security incidents and breaches in its IT systems, networks, and infrastructure. It outlines the roles, responsibilities, actions, and communication protocols to be followed in the event of a security incident to ensure a timely, coordinated, and effective response.  === Objectives ===  The primary objectives...\""
            },
            {
                "logid": 313,
                "ns": 0,
                "title": "Incident Management",
                "pageid": 310,
                "logpage": 310,
                "revid": 364,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2024-05-19T21:09:00Z",
                "comment": "Created page with \"== Incident Management ==  '''Incident Management''' is the process of coordinating and managing the response to security incidents and breaches in an organization's IT systems, networks, and infrastructure. It involves the timely detection, reporting, assessment, and resolution of security incidents to minimize their impact on business operations and mitigate potential risks.  === Objectives ===  The primary objectives of Incident Management include:  * '''Timely Detect...\""
            },
            {
                "logid": 312,
                "ns": 0,
                "title": "Incident Response",
                "pageid": 309,
                "logpage": 309,
                "revid": 363,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2024-05-19T20:55:59Z",
                "comment": "Created page with \"== Incident Response ==  '''Incident Response''' is the process of detecting, analyzing, and responding to security incidents and breaches in an organization's IT systems, networks, and infrastructure. It involves implementing predefined procedures and measures to contain, mitigate, and recover from security breaches, minimize the impact on business operations, and restore normalcy as quickly as possible.  === Objectives ===  The primary objectives of Incident Response i...\""
            },
            {
                "logid": 311,
                "ns": 0,
                "title": "Business Continuity Planning",
                "pageid": 308,
                "logpage": 308,
                "revid": 361,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2024-05-19T20:53:09Z",
                "comment": "Redirected page to [[Continuity Plan]]"
            },
            {
                "logid": 310,
                "ns": 0,
                "title": "Disaster Recovery",
                "pageid": 307,
                "logpage": 307,
                "revid": 360,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2024-05-19T20:51:19Z",
                "comment": "Created page with \"== Disaster Recovery ==  '''Disaster Recovery''' (DR) is the process of restoring and resuming normal business operations following a disruptive event that affects an organization's IT systems, infrastructure, or facilities. It involves implementing strategies, plans, and procedures to recover data, restore systems, and resume critical business functions in the event of a natural disaster, cyber attack, or other catastrophic events.  === Objectives ===  The primary objec...\""
            },
            {
                "logid": 309,
                "ns": 0,
                "title": "Business Impact Analysis",
                "pageid": 306,
                "logpage": 306,
                "revid": 359,
                "params": {},
                "type": "create",
                "action": "create",
                "user": "Ccocrick",
                "timestamp": "2024-05-19T20:49:17Z",
                "comment": "Created page with \"== Business Impact Analysis ==  A '''Business Impact Analysis''' (BIA) is a systematic process of assessing the potential consequences of disruptive events on an organization's operations, processes, and resources. It aims to identify and prioritize critical business functions, dependencies, and recovery requirements to ensure continuity of operations and minimize the impact of disruptions.  === Objectives ===  The primary objectives of a Business Impact Analysis include...\""
            }
        ]
    }
}