The CSI Case Management System is about to be released. The courses will be updated to match the update.
I |
|---|
IEC 61850IEC 61850 is a standard communication protocol for electrical substations, used to ensure interoperability between devices and systems in the power grid, particularly for monitoring, protection, and control applications in ICS environments. | |
IEC 62443IEC 62443 is a series of international standards that provide guidelines for the security of Industrial Automation and Control Systems (IACS). It covers security policies, procedures, and technologies for protecting ICS from cyber threats. | |
IMEI (International Mobile Equipment Identity)A unique identifier assigned to many cellular devices. IMEI data can appear in provider records and device diagnostics and may help link a SIM/account to a specific handset when combined with other evidence. | |
ImmutableA property describing data that cannot be altered without detection once recorded and confirmed on a blockchain. | |
Incident Response (IR)A structured approach to managing and investigating cybersecurity events. In a law enforcement context, IR concepts (containment, eradication, recovery, logging) can overlap with criminal investigation steps when evidence collection and chain of custody are required. | |
Inculpatory EvidenceEvidence that supports the conclusion that a person committed an offense. In digital investigations, this can include authenticated messages, device artifacts showing creation/possession, login records, file transfers, or coordinated activity across accounts and devices. | |
Indicator of Compromise (IOC)A data point associated with malicious activity, such as a file hash, domain, IP, registry key, mutex name, or process behavior. IOCs guide searches and detections but typically require corroboration to prove criminal responsibility. | |
Industrial Control Systems (ICS)Industrial Control Systems (ICS) are integrated hardware and software systems used to monitor and control industrial processes, such as manufacturing, energy production, water treatment, and more. These systems often include SCADA, DCS, and PLC components. | |
Industrial CybersecurityIndustrial Cybersecurity refers to the practice of protecting ICS, IIoT, SCADA, and other industrial systems from cyber threats, ensuring the integrity, availability, and confidentiality of critical infrastructure and operations. | |