Data-in-motion
Data crossing or temporarily resident in a network.
A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.
The process of converting encrypted data into something that a human or computer can understand. Taking ciphertext and converting it into plaintext.
A cyber attack that renders a network or other computing resource unavailable to its users. Compare distributed denial-of-service attack.
The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources.