The CSI Case Management System is about to be released. The courses will be updated to match the update.
O |
|---|
OFACU.S. Office of Foreign Assets Control; administers sanctions programs relevant to crypto compliance and exposure screening. | |
Off‑ChainData or events occurring outside the blockchain ledger (e.g., exchange logs, chats, email, IP records). | |
On‑ChainData or events recorded directly on the blockchain ledger. | |
One-Time Pad (OTP)A theoretically perfect encryption method that uses a truly random key the same length as the plaintext, used only once. While information-theoretically secure, OTP is impractical at scale due to key generation, distribution, and management requirements. | |
OPC (OLE for Process Control)OPC (OLE for Process Control) is an industrial communication standard that allows different control systems and devices to communicate by providing a common interface, facilitating interoperability between various hardware and software in ICS environments. | |
OPC UA (Unified Architecture)OPC UA is a platform-independent industrial communication protocol used for secure and reliable data exchange in ICS and IIoT environments. It is an evolution of the OPC standard, supporting complex data models and enhanced security features. | |
Open-Source Intelligence (OSINT)Information collected from publicly available sources such as websites, social media, public records, forums, and leaked datasets. OSINT can generate leads and context but must be validated; investigators document sources, capture methods, and time of collection. | |
Operating System (OS)An Operating System is system software that manages computer hardware, memory, storage, processes, and user interaction. It provides services to applications and enforces security, access control, and resource allocation. | |
Operational Security (OPSEC)Practices used to protect investigative methods, identities, and sensitive information from exposure. In digital investigations, OPSEC includes safe browsing, identity separation, avoiding metadata leakage, using controlled systems, and documenting protective measures for undercover work. | |