The CSI Case Management System is about to be released. The courses will be updated to match the update.
6 |
|---|
A |
|---|
Access Control List (ACL)A list of permissions attached to a file or resource that specifies which users or groups can read, write, execute, or modify the object. | |
Account Takeover (ATO)Unauthorized access and control of an online account, often through stolen credentials, phishing, SIM swapping, or malware. Investigations may focus on login IPs, device fingerprints, password reset events, MFA changes, and victim/provider communications. | |
AddressA public alphanumeric identifier used to receive cryptocurrency; comparable to an account number on a blockchain. | |
Address ClusteringAnalytic technique that groups wallet addresses likely controlled by the same entity using transaction behavior heuristics. | |
AdmissibilityThe legal acceptability of evidence in court. Digital evidence admissibility depends on relevance, authenticity, integrity, proper collection, chain of custody, and compliance with rules of evidence and constitutional/statutory requirements. | |
Advanced Encryption Standard (AES)AES is a widely adopted symmetric block cipher standard. It supports 128, 192, and 256-bit keys and is commonly used for disk encryption, VPNs, encrypted messaging, and secure storage. | |
AEAD (Authenticated Encryption with Associated Data)AEAD is an authenticated encryption approach that encrypts a message while also authenticating additional unencrypted data (such as headers). AEAD is used heavily in network protocols like TLS, where some fields must remain visible but still integrity-protected. | |
AES-GCMAES-GCM (Galois/Counter Mode) is a widely used AEAD mode providing confidentiality and integrity. It is fast and common in TLS and VPNs, but requires strict nonce uniqueness for safety. | |
AffidavitA written statement of facts made voluntarily under oath or affirmation. In digital investigations, affidavits commonly support search warrants by explaining probable cause, describing the digital evidence sought (devices, accounts, cloud data), and outlining the methods used to identify and preserve it. | |