Learn Digital Investigations
Study Digital Investigations using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(29)
Decks
Flashcards
Learners
-
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks ...35Decks859Flashcards6Learners -
Digital Business and Information Systems
Digital Business and Information Systems
By: Luke Heeremans
(01) Carr, N. G. (2003). IT doesn't matter. Educause Review, 38, 24-38., (01) Digital business strategy: toward a next generation of insights. Bharadwaj, A., El Sawy, O. A., Pavlou, P. A., & Venkatraman, N. V. (2013).., (01) Lecture Note: R. Fichman (2012). Distinctive IT Characteristics: Implications for Digital Innovation and Value Creation, Boston College.Creation ...18Decks149Flashcards19Learners -
Major Investigations
Major Investigations
By: Joana Gaspar
Intell, Evaluating intell, The value of intelligence and recap of models/ processes ...9Decks138Flashcards1Learner -
CSF
CSF
By: Maria Beatriz Martins
1-Overview, 2 - Legal framework, 3 - Digital Investigation Process ...8Decks58Flashcards2Learners -
Aqa Tech anything Missed Out
Aqa Tech anything Missed Out
By: Taha Ahmed
Physical Properties Missed Out …, Investigating And Testing Materials, Feasibilty Studies Chp 1.12/ 1.26 ...24Decks255Flashcards1Learner -
CS414 - Digital Forensics
CS414 - Digital Forensics
By: Caroline Mckinlay
Week 1 - Further Overview, Week 1 - The Place of Digital Forensics, Week 1 - The Investigative Process ...30Decks316Flashcards17Learners -
12 Human Bio Ch. 17, 18, 19 & 20
12 Human Bio Ch. 17, 18, 19 & 20
By: Keeley McGee
Characteristics of Primates- Digits (17), Adaptions for Erect Posture and Locomotion (18), Evolutionary Trends in Skulls- Cerebral Cortex, Dentition (18) ...13Decks206Flashcards6Learners -
WDF A-Level : Product Design
WDF A-Level : Product Design
By: Miss Smith
1.1 Mechanical & Physical Properties of Materials, 1.2 Classification of Materials, 1.3 Methods for Investigating and Testing Materials ...52Decks904Flashcards2Learners -
DT - Technical Principles
DT - Technical Principles
By: Isabella Louth
1. Materials and their applications, 2. Classification of materials, 3. Methods for investigating and testing materials ...29Decks632Flashcards1Learner -
Cyber Security (CompTIA Security+)
Cyber Security (CompTIA Security+)
By: Jeremy Lazzari
Chapter 1 - Threats, Attacks, and Vulnerabilities, Chapter 1.1 - Social Engineering, Chapter 1.2 - Attack Types ...41Decks1,670Flashcards6Learners -
Paper 1
Paper 1
By: Eva Laverty
Methods for investigating and testing materials, Performance characteristics of woods, Biodegradable polymers ...21Decks255Flashcards2Learners -
Computer Forensics
Computer Forensics
By: Anna Speigner
Book One-Chapter One, Book One-Chapter Two, Book One-Chapter Three ...19Decks219Flashcards18Learners -
Certified Cyber Forensic Professional
Certified Cyber Forensic Professional
By: Keith Beastrom
Domain 1 - Legal And Ethical Principles, Domain 2 - Investigations, Domain 3 - Forensic Science ...6Decks50Flashcards3Learners -
A Level DT Paper 1
A Level DT Paper 1
By: Daniel Ashade
3.1.1 Materials And Their Applications, 3.1.1 Classification of Materials, 3.1.1 Methods for Investigating And Testing Materials ...36Decks358Flashcards3Learners -
SEC+SY0-601
SEC+SY0-601
By: Scott Byrams
1.1 Compare and contrast different types of social engineering tecchniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks ...35Decks546Flashcards19Learners -
Security + SY0-601
Security + SY0-601
By: Alket Shabani
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks. ...24Decks258Flashcards40Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks ...38Decks387Flashcards1Learner -
Security+ Continuation
Security+ Continuation
By: Wisdom Eke
3.5 Given a scenario, implement secure mobile solutions., 3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud, 3.7 Given a Scenarior, Implement Identity and account management controls ...15Decks463Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
4.0 Operations and Incident Response
4.0 Operations and Incident Response
By: E. Slate
4.1 Organizational Security, 4.2 Policies / Processes Incident Response, 4.3 Incident Investigation ...5Decks25Flashcards2Learners -
Product Design
Product Design
By: Miss Smith
1.1 Mechanical & Physical Properties of Materials, 1.2 Classification of Materials, 1.3 Methods for Investigating and Testing Materials ...26Decks171Flashcards1Learner -
ICT A Level
ICT A Level
By: Darren Nott
1b Investigation methods, 1c Prototyping & RAD *, 1d Testing & Test Plans * ...54Decks164Flashcards8Learners -
Summative Two
Summative Two
By: Ann Bennett
Road Traffic Act 1988, Police powers in relation to Drivers, Drink Driving and ASB ...10Decks66Flashcards1Learner -
SEC+
SEC+
By: Kevin Watke
1.5: Threat Actors and Vectors, 1.6: Vulnerabilities, 1.7: Security Assessments ...31Decks65Flashcards2Learners -
SGreene
SGreene
By: Andrew Levine
1.1 Understand, Adhere, and Promote Professional Ethics, 1.2 Understand and Apply Security Concepts, 1-4.3 Privacy Principles ...126Decks622Flashcards1Learner -
Percepio Security +
Percepio Security +
By: Beth Hosek
Social Engineering Techniques & Other Attack Types, Implementing Identity and Account Management & AAA Solutions, Physical Security Controls ...12Decks38Flashcards1Learner -
DT : Technical Principles
DT : Technical Principles
By: Tyler Jag
Materials and their application, Classification of materials, Methods for investigating and testing materials ...29Decks109Flashcards1Learner -
Y4 SA - MSK
Y4 SA - MSK
By: Lucy Butler
Investigation & management of the juvenile lame animal, Elbow imaging, MSK diagnostics review & interpretation of orthopaedic radiographs ...17Decks38Flashcards1Learner -
Sec+ -> 4.0 Operations and Incident Response (16%)
Sec+ -> 4.0 Operations and Incident Response (16%)
By: Isabelle S
4.1 - Given a scenario, use the appropriate tool to assess organizational security., 4.2 - Summarize the importance of policies, processes, and procedures for incident response., 4.3 - Given an incident, utilize appropriate data sources to support an investigation. ...5Decks41Flashcards1Learner