All public logs
From Encyclopedia of Cybersecurity
Combined display of all available logs of Encyclopedia of Cybersecurity. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 21:18, 19 May 2024 Ccocrick talk contribs created page Evidence Handling (Created page with "== Evidence Handling == '''Evidence Handling''' refers to the procedures and practices involved in the collection, preservation, storage, and transportation of physical or digital evidence in legal proceedings, investigations, and forensic analysis. Proper evidence handling is essential for maintaining the integrity, authenticity, and admissibility of evidence in court and ensuring that it remains reliable and credible throughout the legal process. === Importance ===...")
- 21:18, 19 May 2024 Ccocrick talk contribs created page Chain of Custody (Created page with "== Chain of Custody == '''Chain of Custody''' (CoC) refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, and analysis of physical or digital evidence in legal proceedings, investigations, and forensic processes. It ensures the integrity, authenticity, and admissibility of evidence by documenting who had possession of the evidence, when, and under what circumstances. === Importance === Chain of Custody is cru...")
- 21:18, 19 May 2024 Ccocrick talk contribs created page Digital Forensics (Created page with "== Digital Forensics == '''Digital Forensics''', also known as '''cyber forensics''' or '''computer forensics''', is the process of collecting, preserving, analyzing, and presenting digital evidence in support of legal proceedings, investigations, and incident response efforts. It involves the use of specialized techniques, tools, and methodologies to extract and interpret digital evidence from computers, networks, mobile devices, and other digital media. === Objective...")
- 21:12, 19 May 2024 Ccocrick talk contribs created page Incident Response Plan (Created page with "== Incident Response Plan == An '''Incident Response Plan''' (IRP) is a predefined set of procedures and guidelines designed to guide an organization's response to security incidents and breaches in its IT systems, networks, and infrastructure. It outlines the roles, responsibilities, actions, and communication protocols to be followed in the event of a security incident to ensure a timely, coordinated, and effective response. === Objectives === The primary objectives...")
- 21:09, 19 May 2024 Ccocrick talk contribs created page Incident Management (Created page with "== Incident Management == '''Incident Management''' is the process of coordinating and managing the response to security incidents and breaches in an organization's IT systems, networks, and infrastructure. It involves the timely detection, reporting, assessment, and resolution of security incidents to minimize their impact on business operations and mitigate potential risks. === Objectives === The primary objectives of Incident Management include: * '''Timely Detect...")
- 20:55, 19 May 2024 Ccocrick talk contribs created page Incident Response (Created page with "== Incident Response == '''Incident Response''' is the process of detecting, analyzing, and responding to security incidents and breaches in an organization's IT systems, networks, and infrastructure. It involves implementing predefined procedures and measures to contain, mitigate, and recover from security breaches, minimize the impact on business operations, and restore normalcy as quickly as possible. === Objectives === The primary objectives of Incident Response i...") Tag: Visual edit: Switched
- 20:53, 19 May 2024 Ccocrick talk contribs created page Business Continuity Planning (Redirected page to Continuity Plan) Tags: New redirect Visual edit
- 20:51, 19 May 2024 Ccocrick talk contribs created page Disaster Recovery (Created page with "== Disaster Recovery == '''Disaster Recovery''' (DR) is the process of restoring and resuming normal business operations following a disruptive event that affects an organization's IT systems, infrastructure, or facilities. It involves implementing strategies, plans, and procedures to recover data, restore systems, and resume critical business functions in the event of a natural disaster, cyber attack, or other catastrophic events. === Objectives === The primary objec...")
- 20:49, 19 May 2024 Ccocrick talk contribs created page Business Impact Analysis (Created page with "== Business Impact Analysis == A '''Business Impact Analysis''' (BIA) is a systematic process of assessing the potential consequences of disruptive events on an organization's operations, processes, and resources. It aims to identify and prioritize critical business functions, dependencies, and recovery requirements to ensure continuity of operations and minimize the impact of disruptions. === Objectives === The primary objectives of a Business Impact Analysis include...")
- 20:47, 19 May 2024 Ccocrick talk contribs created page Red Team (Created page with "== Red Team == A '''Red Team''' is a group of skilled cybersecurity professionals tasked with simulating real-world cyber attacks against an organization's systems, networks, and infrastructure to identify security vulnerabilities, weaknesses, and gaps in defenses. Unlike ethical hackers who conduct penetration tests with permission, Red Teams operate with a high degree of autonomy and secrecy, often emulating the tactics, techniques, and procedures (TTPs) of real adver...")
- 20:46, 19 May 2024 Ccocrick talk contribs created page Ethical Hacking (Created page with "== Ethical Hacking == '''Ethical Hacking''', also known as '''white-hat hacking''' or '''penetration testing''', is the practice of deliberately attempting to penetrate computer systems, networks, or applications with the permission of the owner to identify and address security vulnerabilities and weaknesses. Unlike malicious hackers, ethical hackers use their skills and knowledge for constructive purposes, helping organizations improve their security posture and defend...")
- 20:44, 19 May 2024 Ccocrick talk contribs created page Risk Assessment (Created page with "== Risk Assessment == '''Risk Assessment''' is a systematic process of identifying, analyzing, and evaluating potential risks to an organization's assets, operations, and objectives. It aims to quantify the likelihood and potential impact of various threats and vulnerabilities, enabling informed decision-making and prioritization of risk management efforts. === Process === The risk assessment process typically involves the following steps: # '''Risk Identification'''...")
- 20:43, 19 May 2024 Ccocrick talk contribs created page Risk Management (Created page with "== Risk Management == '''Risk Management''' is the process of identifying, assessing, prioritizing, and mitigating risks to an organization's assets, operations, and objectives. It involves systematically analyzing potential threats and vulnerabilities, evaluating their potential impact and likelihood, and implementing measures to minimize or control the associated risks. === Process === The risk management process typically consists of the following steps: # '''Risk...")
- 20:39, 19 May 2024 Ccocrick talk contribs created page Security Policy (Created page with "== Security Policy == A '''Security Policy''' is a set of rules, guidelines, and procedures established by an organization to define and enforce the requirements, responsibilities, and best practices for protecting its information assets, systems, and infrastructure from security threats and vulnerabilities. === Purpose === The primary purposes of a security policy are to: * '''Establish Standards''': Define the minimum acceptable levels of security for the organizat...")
- 20:37, 19 May 2024 Ccocrick talk contribs created page Security Audit (Created page with "== Security Audit == A '''Security Audit''' is a systematic evaluation of an organization's information systems, policies, procedures, and controls to assess compliance with security standards, identify vulnerabilities, and ensure the confidentiality, integrity, and availability of sensitive data and resources. === Objectives === The primary objectives of a security audit include: * '''Compliance Verification''': Ensuring compliance with relevant laws, regulations, i...")
- 20:33, 19 May 2024 Ccocrick talk contribs created page Penetration Testing (Created page with "== Penetration Testing == '''Penetration Testing''', often abbreviated as '''pen testing''', is a proactive security assessment technique designed to identify and exploit vulnerabilities in a system, network, application, or organization. Unlike vulnerability assessments, which focus on identifying weaknesses, penetration testing goes a step further by simulating real-world attacks to assess the effectiveness of existing security controls and defenses. === Types === P...")
- 20:32, 19 May 2024 Ccocrick talk contribs created page Vulnerability Assessment (Created page with "== Vulnerability Assessment == A '''Vulnerability Assessment''' is a systematic process of identifying, quantifying, and prioritizing vulnerabilities within a system, network, application, or organization. It aims to proactively identify weaknesses that could be exploited by attackers to compromise security, steal sensitive information, or disrupt operations. === Process === The vulnerability assessment process typically involves the following steps: # '''Asset Ident...")