Glossary of Terms
Any observable occurrence in a system or network. Most events are normal, routine operations (e.g., a user successfully logging in).
A notification generated when a tool or system detects an event that is abnormal, unexpected, or potentially malicious. An alert signals that something requires further investigation.
An event or alert that, after investigation, is confirmed to be a security breach or violation of security policy with a significant enough impact to warrant an official response.
The technical, hands-on process of investigating what happened during an incident and performing recovery actions. It is focused on the forensic and remediation aspects.
The broader, overarching process of dealing with an incident, which includes communications, media relations, reporting, coordinating support, and making strategic decisions.
A designated team of experts with business, technical, legal, and public relations skills responsible for responding to and managing cybersecurity incidents.
A crucial component of cybersecurity that involves the collection, analysis, and interpretation of digital evidence to investigate and respond to to cyber incidents.
The process of gathering evidence from digital devices in a forensically sound manner, ensuring the original evidence is not altered or contaminated.
Hardware or software used during forensic acquisition to prevent any changes or modifications to the original evidence, thereby preserving its integrity.
The process of preserving relevant electronic or physical evidence related to actual or potential litigation, regulatory investigations, or other legal proceedings.
The chronological documentation of the handling, transfer, and storage of evidence from collection to presentation in court. It establishes a trail of accountability.
Short for electronic discovery, it is the process of collecting, processing, and analyzing electronic data (like emails, documents, databases) for use as evidence in legal cases.
A systematic process used in the post-incident phase to identify the fundamental underlying causes of an incident, with the goal of preventing recurrence.
A proactive cybersecurity practice that involves actively searching through networks and systems to detect and isolate advanced threats that may have evaded existing security controls.