The CSI Case Management System is about to be released. The courses will be updated to match the update.
M |
|---|
MainnetThe primary production network of a blockchain (as opposed to testnet). | |
MalwareMalicious software designed to disrupt operations, steal data, or gain unauthorized access. Malware investigations may involve reverse engineering, log analysis, persistence mechanisms, command-and-control infrastructure, and correlation with known threat actor behaviors. | |
Malware AnalysisMalware analysis is the process of studying and examining malicious software (malware) in order to understand how it works, what it does, and how it can be detected and removed. This is typically done by security professionals, researchers, and other experts who specialize in analyzing and identifying malware threats. There are several different techniques and approaches that can be used in malware analysis, including:
Examples of malware analysis include:
| |
Master File Table (MFT)The core metadata structure in NTFS that stores records describing every file and directory on the volume, including attributes and disk location data. | |
MBRThe master boot record (MBR) is a small piece of code located on the first sector of a hard drive that is responsible for booting the operating system. When a computer is turned on, the MBR is loaded into memory and executes the bootloader, which then loads the operating system. The MBR consists of several components, including:
The MBR has a fixed size of 512 bytes and is typically stored on a hard drive in the first sector. It is important to note that the MBR is separate from the bootloader and the operating system, and is not affected by changes to these components. One example of the importance of the MBR is in the case of malware that infects the MBR. Some types of malware, such as bootkits, are designed to infect the MBR and modify the boot process in order to gain access to the system. This can allow the malware to persist even after the operating system is reinstalled, making it difficult to remove. In order to protect against MBR infections, it is important to regularly update the operating system and antivirus software, and to be cautious when downloading and installing software from untrusted sources. Additionally, it is a good practice to regularly create backups of the MBR in case it is compromised. | |
MD5A legacy hash algorithm sometimes still encountered in forensic workflows and tool outputs. MD5 is fast but has known collision weaknesses; many agencies prefer stronger hashes (like SHA-256) while still documenting MD5 where required for compatibility. | |
Memory ManagementThe operating system function that allocates, tracks, and protects system memory. It includes paging, virtual memory, segmentation, and memory isolation between processes. | |
MempoolThe set of valid, unconfirmed transactions awaiting inclusion in a block. | |
Message Authentication Code (MAC)A cryptographic checksum that ensures integrity and authenticity using a shared secret key. MACs do not provide non-repudiation because both parties share the same key. | |