Worm
Worm: A type of malware that self-replicates to spread to other computers. Unlike viruses, worms do not need to attach themselves to a host program. They often exploit network vulnerabilities to infect systems and can cause widespread damage without user intervention.
Write blocker
Write blocker: A device used to prevent the alteration of data on a storage medium during an investigation. It is commonly used in forensic analysis to preserve the integrity of evidence. Examples include hardware write blockers, software write blockers, and bootable write blockers.
Write Once Read Many (WORM)
Write Once Read Many (WORM): A type of data storage that allows data to be written once but read multiple times. It is commonly used in industries such as finance and healthcare, where data must be retained for extended periods of time and remain unchanged. Examples of its use include storing financial records for compliance […]
Write protect
Write protect: A hardware or software mechanism that prevents modification or deletion of data on a storage device. Write protection ensures the integrity of data by making it read-only, safeguarding it against accidental or malicious alterations.
Warm site
Warm site: A disaster recovery option between a hot site and a cold site, a warm site provides a location equipped with the necessary infrastructure and connectivity but not the active hardware or data required for immediate operation. Organizations use warm sites to expedite recovery time following a disruption, as they can quickly be equipped […]
Watering hole attack
Watering hole attack: An attack where attackers seek to compromise a specific group of individuals by infecting websites that members of the group are known to visit. The goal is to infect a targeted user’s computer and gain access to the network at the targeted user’s place of employment.