1.
Reviewing logs to detect suspicious or unauthorized activities.
2.
An evaluation of an organization's security policies and systems.
3.
A set of procedures for identifying and handling security incidents.
4.
An observable occurrence relevant to system security.
5.
Creating an exact copy of a digital device for investigation.
6.
Documentation of who handled evidence and when.
7.
Proactively searching for signs of malicious activity.
8.
A set of security settings that serve as a benchmark for systems.
9.
Encryption using the same key for both encryption and decryption.
10.
A framework for developing, implementing, and monitoring IT governance.
11.
A European regulation on data protection and privacy.
12.
A form of public key encryption based on elliptic curves.