ACRONYM
|
FULL FORM
|
| 5WH |
Who, what, when, where, why, and how? |
| ABA |
American Bar Association |
| ADIA |
Appliance for Digital Analysis and Investigation (ADIA) |
| ADS |
Alternate Data Stream |
| AMA |
American Medical Association |
| AMI |
Amazon Machine Instance |
| AP |
access point |
| APA |
American Psychological Association |
| APDU |
Application Protocol Data Unit |
| API |
Application Programming Interface |
| ARIN |
American Registry for Internet Numbers |
| ARP |
Address Resolution Protocol |
| ASCFLD |
American Society of Crime Laboratory Directors |
| ASCII |
American Standard Code for Information Interchange |
| ASCII |
American Society of Digital Forensics and Electronic Discovery |
| ASDFED |
American Society of Digital Forensics and Electronic Discovery |
| ATA |
Advanced Technology Attachment |
| AWS |
Amazon Web Services |
| BC/DR |
Business Continuity/disaster Recovery |
| BCD |
Binary Coded Decimal |
| BIOS |
Basic Input/output System |
| BSC |
Base Station Controller |
| BTS |
Base Transceiver Station |
| CART |
Computer Analysis and Response Team |
| CAWFE |
Certified Advanced Windows Forensic Examiner |
| CCE |
Certified Computer Examiner |
| CCIPS |
Computer Crime and Intellectual Property Section |
| CCTV |
Closed-Circuit Television |
| CD |
Compact Disc |
| CDFS |
CD file system |
| CD-R |
CD-recordable |
| CD-ROM |
CD-read-only memory |
| CD-RW |
CD-rewritable |
| CEH |
Certified Ethical Hacker |
| CF |
Compact Flash |
| CFCE |
Certified Forensic Computer Examiner |
| CFI |
Computer and financial investigations |
| CFRDC |
Computer Forensics Research and Development Center |
| CFReDS |
Computer Forensic Resource Data Sets |
| CFTT |
Computer Forensics Tool Testing |
| CFTT |
Computer Forensics Tool Test |
| CIDR |
Classless inter-domain routing protocol |
| CIR |
Consumer infrared |
| CMOS |
Complementary metal oxide semiconductor |
| CNIC |
Cellular network isolation card |
| CODEC |
Coder-decoder |
| CPA |
Certified Public Accountant |
| CSIM |
DMA Subscriber Identity Module |
| CSIRT |
Computer Security Incident Response Team |
| CSOC |
Computer Security Operations Center |
| CV |
Curriculum Vitae |
| CVE |
Common vulnerabilities and exposures |
| DART |
Digital Advanced Response Toolkitdd duplicate disk/data dump |
| DDoS |
Distributed denial of service |
| DHCP |
Dynamic Host Configuration Protocol |
| DLL |
Dynamic link library |
| DNA |
Distributed Network Access |
| DNS |
Domain Name System |
| DoD |
Department of Defense |
| DoS |
Denial of Service |
| DVD |
Digital Video Disc or Ddigital Versatile Disc |
| DVD-R |
DVD-recordable |
| DVD-ROM |
DVD-read-only memory |
| DVD-RW |
DVD-rewritable |
| EAP |
Extensible Authentication Protocol |
| EAP-TLS |
EAP with Transport Layer SecurityEC2 Elastic Compute Cloud |
| ECC |
Error Checking and Correction |
| EDGE |
Enhanced Data for GSM Evolution |
| EMS |
Enhanced Messenger Service |
| ES |
End System |
| ESN |
Electronic Serial Number |
| ETSI |
European Telecommunications Standards Institute |
| ESP |
Encapsulating Security Payload |
| ETI |
Enterprise Theory of Investigatione |
| UICC |
Embedded Universal Integrated Circuit Cardext2fs second extended file systemext3fs third extended file systemext4fs fourth extended file system |
| F.I.R.E. |
Forensic and Incident Response EnvironmentFACCI Florida Association of Computer Crime Investigators |
| FAT |
File Allocation Table |
| FBI |
Federal Bureau of Investigation |
| FCC ID |
Federal Communications Commission Identification Number |
| FIPS |
Federal Information Processing Standards |
| FISMA |
Federal Information Security Management Act |
| FLETC |
Federal Law Enforcement Training Center |
| FOSS |
Free and Open-Source Software |
| FRCP |
Federal Rules of Civil Procedure |
| FRE |
Federal Rules of Evidence |
| FRED |
Forensic Recovery of Digital Evidence |
| FRED-L |
Forensic Recovery of Digital Evidence – Laptop |
| FTP |
File Transfer ProtocolGB gigabyte |
| GC |
Garbage Collection |
| GDI |
Graphics Device Interface |
| GPRS |
General Packet Radio Service |
| GPS |
Gglobal Positioning System |
| GSM |
Global System for Mobile Communications |
| GUI |
Graphical User Interface |
| GWES |
Graphics, Windowing, and Events Subsystem |
| HAL |
Hardware Abstraction Layer |
| HFS |
Hierarchical File System |
| HIPO |
Hierarchical Input-Process-Output |
| HKEY |
HIVE keyHPA host-protected area |
| HPFS |
High-Performance File System |
| HTCIA |
High Technology Crime Investigation Association |
| HTML |
Hypertext Markup Language |
| HTTP |
Hypertext Transfer Protocol |
| IaaS |
Infrastructure as a Service |
| IACIS |
International Association of Computer Investigative Specialists |
| IANA |
Internet Assigned Numbers Authority |
| ICCID |
Integrated circuit card identification |
| ICMP |
Internet Control Message ProtocolID identification |
| IDE |
Integrated Drive Electronics |
| iDEN |
Integrated Digital Enhanced Network |
| IDS |
Intrusion Ddetection Ssystem |
| IEEE |
Institute of Electrical and Electronics Engineers |
| IETF |
Internet Engineering Task Force |
| IGMP |
Internet Group Management Protocol |
| IIS |
Internet Information Server |
| IM |
Instant messaging |
| IMAP |
Internet Message Access Protocol |
| IMEI |
International Mobile Equipment Identity |
| IMSI |
International Mobile Subscriber Identity |
| IOCE |
International Organization on Computer Evidence |
| IOS |
Internetwork Operating System |
| IP |
Internet Protocol |
| Ipsec |
Internet Protocol Security |
| IR |
Interagency report |
| IRC |
Internet Relay Chat |
| IrDA |
Infrared Data Association |
| IRQ |
Interrupt Request Line |
| IS |
Intermediate System (a router or gateway) |
| ISFCE |
International Society of Forensic Computer Examiners |
| ISO |
International Organization for Standardization |
| ISP |
Internet Service Provider |
| IT |
Information Technology |
| ITL |
Information Technology Laboratory |
| JPEG |
Joint Photographic Experts GroupJTAG Joint Test Action Group |
| KB |
Kilobyte |
| LACNIC |
Latin American and Caribbean IP Network Information Centre |
| LAN |
Local Area Network |
| LBA |
Logical block addressing |
| LCD |
Liquid crystal display |
| LED |
Light-emitting diode |
| LND |
Last numbers dialed |
| MAC |
Modification, access, and creation |
| MAC |
Media Access Control |
| MACE |
Modified, accessed, created or entry modified |
| MAN |
Metropolitan Area Network |
| MATLAB |
Mathematics Laboratory |
| MB |
MegabyteMBR Master Bboot Record |
| MD |
Message DigestMD5 Message Digest 5 |
| MEID |
Mobile Eequipment Identifier |
| MFT |
Master File Table |
| MISTI |
MIS Training Institute |
| MMC |
Multimedia card |
| MO |
Magneto-Ooptical |
| MPE+ |
Mobile Phone Examiner Plus |
| MSC |
Mobile Switching Center |
| MS-DOS |
Microsoft Disk Operating System |
| MSISDN |
Mobile Subscriber Integrated Services Digital Network |
| NAS |
Network Accessible Storage |
| NAT |
Network Address Translation |
| NetBIOS |
Network BIOS |
| NFA |
Network Forensic Analysis Tool |
| NFC |
Near-field Communication |
| nNFS |
Network File Sharing |
| NIC |
Network Interface Card |
| NIJ |
National Institute of Justice |
| NIST |
National Institute of Standards and Technology |
| NLECTC-NE |
National Law Enforcement and Corrections Technology Center, North East |
| NNTP |
Network News Transport Protocol |
| NSM |
Network Security Monitoring |
| NSRL |
National Software Reference Library |
| NTFS |
Windows NT File SystemNTI New Technologies, Inc. |
| NTP |
Network Time ProtocolNW3C National White Collar Crime Center |
| OAL |
OEM Adaption Layer |
| ODBC |
Open Database Connectivity |
| OEM |
Original Equipment Manufacturer |
| OMB |
Office of Management and Budget |
| OS |
Operating System |
| OSI |
Open Systems Interconnect |
| OSR2 |
OEM Service Release 2 |
| PaaS |
Platform as a Service |
| PATA |
Parallel ATA |
| PCMCIA |
Personal Computer Memory Card International Association |
| PDA |
personal digital assistant |
| PEAP |
Protected EAP |
| PIEID |
Preservation, identification, extraction, interpretation, documentation |
| PIM |
Personal Information Management |
| POP |
Post Office Protocol 3 |
| POSE |
Palm Operating System Emulato |
| rPPC |
Pocket PCPPI pixels per inch |
| PPTP |
Point-to-Point Tunneling Protocol |
| PRTK |
Password Recovery Toolkit |
| QEMU |
Quick EMUlator |
| RADIUS |
Remote Authentication Dial-In User Service |
| RAID |
Redundant Array of Inexpensive Disks |
| RAM |
Random Access Memory |
| RAPI |
Remote Application Programming Interface |
| RCFL |
Regional Computer Forensic Laboratory |
| RCS |
Revision Control System |
| RFC |
Request for Comment |
| RIPE NCC |
Réseaux IP Européens Network Coordination Centre |
| ROM |
Read-Only Memory |
| RSA |
Rivest, Shamir, Adelson |
| RSN |
Robust Security NetworkS3 Simple Storage Service |
| SaaS |
Software as a Service |
| SAM |
Security Account Manager |
| SAN |
Storage Area Network |
| SATA |
Serial ATA |
| SCSI |
Small Computer System Interface |
| SD |
Secure Digita |
| lSDHC |
Secure Digital High Capacity |
| SDK |
Software Development Kit |
| SDMI |
Secure Digital Music Initiative |
| SEM |
Security Event Management |
| SFTP |
Secure FTP |
| SHA-1 |
Secure Hash Algorithm 1 |
| SIEM |
Security Information and Event Management |
| SIM |
Subscriber Identity Module |
| SIP |
Session Initiation Protocol |
| SMB |
Server Message Block |
| SME |
Subject Matter Expert |
| SMS |
Short Message Service |
| SMTP |
Simple Mail Transfer Protocol |
| SNMP |
Simple Network Management Protocol |
| SOHO |
Small Office/home Office |
| SOP |
Standard Operational Procedure |
| SP |
Special Publication |
| SPL |
Search Processing Language |
| SSD |
Solid-State Drive |
| SSH |
Secure Shell |
| SSID |
Service Set Identifier |
| SSL |
Secure Sockets Layer |
| STA |
stationSWGDE |
| Scientific |
Working Group on Digital Evidence |
| SWGIT |
Scientific Working Group on Imaging Technologies |
| TAI |
International Atomic Time |
| TB |
Terabyte |
| TCP |
Transmission Control Protocol |
| TCP/IP |
Transmission Control Protocol/Internet Protocol |
| TDMA |
Time Division Multiple Access |
| TFT |
Tthin film Transfer |
| TOR |
The Onion Router |
| UART |
Universal Asynchronous Receiver/Transmitter |
| UDF |
Universal Disk Format |
| UDP |
User Datagram Protocol |
| UFS |
UNIX File System |
| UICC |
Universal Integrated Circuit Card |
| UMTS |
Universal Mobile Telecommunications System |
| UPS |
Uninterruptible Power Supply |
| URL |
Uniform Resource Locator |
| USB |
Universal serial bus |
| USC |
United States Code |
| USIM |
UMTS Subscriber Identity Module |
| UTC |
Universal Coordinated Time |
| VERIS |
Vocabulary for Event Recording and Incident Sharing |
| VLC |
VideoLAN client (now just VLC) media player |
| VMFS |
VMware File System |
| VoIP |
Voice over IP |
| VPN |
Virtual Private Network |
| WAF |
Web Application Firewall |
| WAP |
Wireless Access Point |
| WEP |
Wired Equivalent Privacy |
| Wi-Fi |
Wireless Fidelity |
| WINCE |
Windows CE |
| WLAN |
Wireless LAN |
| WORM |
Write once, read many |
| WPA |
Wireless Protected Access |
| WPA2 |
Wireless Protected Access version 2 |
| XIP |
eXecute in Place |