The CSI Case Management System is about to be released. The courses will be updated to match the update.
S |
|---|
SAR (Suspicious Activity Report)Report filed by regulated entities to financial intelligence units regarding suspicious behavior. | |
Scope of SearchThe boundaries of what investigators are authorized to search and seize (by warrant, consent, or policy). Digital scope can be defined by file types, locations (folders/app sandboxes), accounts, keywords, and dates; exceeding scope risks suppression and case integrity. | |
Screenshot EvidenceAn image capture of information displayed on a device. Screenshots can be useful leads but may lack context (metadata, source, message IDs). Investigators often attempt to obtain native exports, device artifacts, or provider records to authenticate and corroborate the content. | |
Script KiddieA script kiddie (also known as a skiddie) is an individual who uses pre-written scripts or code—often stolen or borrowed without permission or knowledge—to attack computer systems or networks. Script kiddies are not necessarily malicious hackers, and the term is often used to describe those with little or no technical knowledge who use scripts or programs written by more skilled hackers to launch simple attacks against unsuspecting victims. These attacks typically involve using vulnerable programs to gain unauthorized access to systems, networks, or websites. For example, a script kiddie may borrow or steal someone else’s script or program and use it to exploit vulnerable software and gain access to the system. Script kiddies will often target systems or networks for their own amusement and may not have any malicious intent. Though script kiddies may possess some basic knowledge of computer programming and coding, they often lack the technical expertise necessary to understand the risks associated with their attacks. As a result, their activities may cause unnecessary disruption or damage to systems. The term "script kiddie" is often used negatively and viewed derogatorily by experienced hackers and cybersecurity professionals. Script kiddies are often viewed as irresponsible and reckless, and their activities can be dangerous for both them and those they target. | |
ScriptingScripting is writing code (scripts) primarily to automate tasks, glue systems together, or control other software. Scripts are often shorter, executed by an interpreter, and frequently used for administration, data processing, and tool automation. | |
scryptscrypt is a password-based key derivation function designed to be memory-hard, making it more resistant to GPU/ASIC cracking than purely CPU-bound functions. It is used in some password storage systems and cryptocurrencies. | |
SDRAn SDR radio, or software-defined radio, is a radio communication system that uses software to define the characteristics of the radio signal. This allows the radio to be reconfigured and adapt to different frequencies and modes without the need for hardware changes. SDR radios have become increasingly popular in recent years due to their flexibility and ability to support a wide range of communication protocols. They can be used for a variety of purposes, including amateur radio, military communications, and commercial applications. One of the key benefits of SDR radios is that they can be easily modified and customized using software. This allows users to adapt the radio to their specific needs and requirements, rather than being limited to the capabilities of a fixed hardware design. For example, an amateur radio operator may use an SDR radio to receive and transmit on a wide range of frequencies, including shortwave, medium wave, and high frequency. They may also use software to add features such as digital voice decoding or automatic frequency control. Another example of an SDR radio is the HackRF, which is a low-cost, open-source SDR radio that can be used for a variety of purposes, including wireless testing, RF analysis, and digital signal processing. The HackRF can be programmed and modified using software, making it a popular choice among hobbyists and researchers. Overall, SDR radios are a versatile and flexible tool for radio communication, and can be customized and adapted to a wide range of purposes using software. They offer a cost-effective and efficient alternative to traditional hardware-based radios. | |
Search WarrantA court order authorizing law enforcement to search a specific place and seize specific items. In digital investigations, warrants often specify devices, media, accounts, date ranges, data types (messages, photos, logs), and sometimes search protocols to reduce over-collection. | |
Second Preimage ResistanceA property of a hash function where, given an input and its hash, it is computationally infeasible to find a different input that produces the same hash. This supports integrity checking and signature safety. | |