ACRONYM
|
FULL FORM
|
5WH |
Who, what, when, where, why, and how? |
ABA |
American Bar Association |
ADIA |
Appliance for Digital Analysis and Investigation (ADIA) |
ADS |
Alternate Data Stream |
AMA |
American Medical Association |
AMI |
Amazon Machine Instance |
AP |
access point |
APA |
American Psychological Association |
APDU |
Application Protocol Data Unit |
API |
Application Programming Interface |
ARIN |
American Registry for Internet Numbers |
ARP |
Address Resolution Protocol |
ASCFLD |
American Society of Crime Laboratory Directors |
ASCII |
American Standard Code for Information Interchange |
ASCII |
American Society of Digital Forensics and Electronic Discovery |
ASDFED |
American Society of Digital Forensics and Electronic Discovery |
ATA |
Advanced Technology Attachment |
AWS |
Amazon Web Services |
BC/DR |
Business Continuity/disaster Recovery |
BCD |
Binary Coded Decimal |
BIOS |
Basic Input/output System |
BSC |
Base Station Controller |
BTS |
Base Transceiver Station |
CART |
Computer Analysis and Response Team |
CAWFE |
Certified Advanced Windows Forensic Examiner |
CCE |
Certified Computer Examiner |
CCIPS |
Computer Crime and Intellectual Property Section |
CCTV |
Closed-Circuit Television |
CD |
Compact Disc |
CDFS |
CD file system |
CD-R |
CD-recordable |
CD-ROM |
CD-read-only memory |
CD-RW |
CD-rewritable |
CEH |
Certified Ethical Hacker |
CF |
Compact Flash |
CFCE |
Certified Forensic Computer Examiner |
CFI |
Computer and financial investigations |
CFRDC |
Computer Forensics Research and Development Center |
CFReDS |
Computer Forensic Resource Data Sets |
CFTT |
Computer Forensics Tool Testing |
CFTT |
Computer Forensics Tool Test |
CIDR |
Classless inter-domain routing protocol |
CIR |
Consumer infrared |
CMOS |
Complementary metal oxide semiconductor |
CNIC |
Cellular network isolation card |
CODEC |
Coder-decoder |
CPA |
Certified Public Accountant |
CSIM |
DMA Subscriber Identity Module |
CSIRT |
Computer Security Incident Response Team |
CSOC |
Computer Security Operations Center |
CV |
Curriculum Vitae |
CVE |
Common vulnerabilities and exposures |
DART |
Digital Advanced Response Toolkitdd duplicate disk/data dump |
DDoS |
Distributed denial of service |
DHCP |
Dynamic Host Configuration Protocol |
DLL |
Dynamic link library |
DNA |
Distributed Network Access |
DNS |
Domain Name System |
DoD |
Department of Defense |
DoS |
Denial of Service |
DVD |
Digital Video Disc or Ddigital Versatile Disc |
DVD-R |
DVD-recordable |
DVD-ROM |
DVD-read-only memory |
DVD-RW |
DVD-rewritable |
EAP |
Extensible Authentication Protocol |
EAP-TLS |
EAP with Transport Layer SecurityEC2 Elastic Compute Cloud |
ECC |
Error Checking and Correction |
EDGE |
Enhanced Data for GSM Evolution |
EMS |
Enhanced Messenger Service |
ES |
End System |
ESN |
Electronic Serial Number |
ETSI |
European Telecommunications Standards Institute |
ESP |
Encapsulating Security Payload |
ETI |
Enterprise Theory of Investigatione |
UICC |
Embedded Universal Integrated Circuit Cardext2fs second extended file systemext3fs third extended file systemext4fs fourth extended file system |
F.I.R.E. |
Forensic and Incident Response EnvironmentFACCI Florida Association of Computer Crime Investigators |
FAT |
File Allocation Table |
FBI |
Federal Bureau of Investigation |
FCC ID |
Federal Communications Commission Identification Number |
FIPS |
Federal Information Processing Standards |
FISMA |
Federal Information Security Management Act |
FLETC |
Federal Law Enforcement Training Center |
FOSS |
Free and Open-Source Software |
FRCP |
Federal Rules of Civil Procedure |
FRE |
Federal Rules of Evidence |
FRED |
Forensic Recovery of Digital Evidence |
FRED-L |
Forensic Recovery of Digital Evidence – Laptop |
FTP |
File Transfer ProtocolGB gigabyte |
GC |
Garbage Collection |
GDI |
Graphics Device Interface |
GPRS |
General Packet Radio Service |
GPS |
Gglobal Positioning System |
GSM |
Global System for Mobile Communications |
GUI |
Graphical User Interface |
GWES |
Graphics, Windowing, and Events Subsystem |
HAL |
Hardware Abstraction Layer |
HFS |
Hierarchical File System |
HIPO |
Hierarchical Input-Process-Output |
HKEY |
HIVE keyHPA host-protected area |
HPFS |
High-Performance File System |
HTCIA |
High Technology Crime Investigation Association |
HTML |
Hypertext Markup Language |
HTTP |
Hypertext Transfer Protocol |
IaaS |
Infrastructure as a Service |
IACIS |
International Association of Computer Investigative Specialists |
IANA |
Internet Assigned Numbers Authority |
ICCID |
Integrated circuit card identification |
ICMP |
Internet Control Message ProtocolID identification |
IDE |
Integrated Drive Electronics |
iDEN |
Integrated Digital Enhanced Network |
IDS |
Intrusion Ddetection Ssystem |
IEEE |
Institute of Electrical and Electronics Engineers |
IETF |
Internet Engineering Task Force |
IGMP |
Internet Group Management Protocol |
IIS |
Internet Information Server |
IM |
Instant messaging |
IMAP |
Internet Message Access Protocol |
IMEI |
International Mobile Equipment Identity |
IMSI |
International Mobile Subscriber Identity |
IOCE |
International Organization on Computer Evidence |
IOS |
Internetwork Operating System |
IP |
Internet Protocol |
Ipsec |
Internet Protocol Security |
IR |
Interagency report |
IRC |
Internet Relay Chat |
IrDA |
Infrared Data Association |
IRQ |
Interrupt Request Line |
IS |
Intermediate System (a router or gateway) |
ISFCE |
International Society of Forensic Computer Examiners |
ISO |
International Organization for Standardization |
ISP |
Internet Service Provider |
IT |
Information Technology |
ITL |
Information Technology Laboratory |
JPEG |
Joint Photographic Experts GroupJTAG Joint Test Action Group |
KB |
Kilobyte |
LACNIC |
Latin American and Caribbean IP Network Information Centre |
LAN |
Local Area Network |
LBA |
Logical block addressing |
LCD |
Liquid crystal display |
LED |
Light-emitting diode |
LND |
Last numbers dialed |
MAC |
Modification, access, and creation |
MAC |
Media Access Control |
MACE |
Modified, accessed, created or entry modified |
MAN |
Metropolitan Area Network |
MATLAB |
Mathematics Laboratory |
MB |
MegabyteMBR Master Bboot Record |
MD |
Message DigestMD5 Message Digest 5 |
MEID |
Mobile Eequipment Identifier |
MFT |
Master File Table |
MISTI |
MIS Training Institute |
MMC |
Multimedia card |
MO |
Magneto-Ooptical |
MPE+ |
Mobile Phone Examiner Plus |
MSC |
Mobile Switching Center |
MS-DOS |
Microsoft Disk Operating System |
MSISDN |
Mobile Subscriber Integrated Services Digital Network |
NAS |
Network Accessible Storage |
NAT |
Network Address Translation |
NetBIOS |
Network BIOS |
NFA |
Network Forensic Analysis Tool |
NFC |
Near-field Communication |
nNFS |
Network File Sharing |
NIC |
Network Interface Card |
NIJ |
National Institute of Justice |
NIST |
National Institute of Standards and Technology |
NLECTC-NE |
National Law Enforcement and Corrections Technology Center, North East |
NNTP |
Network News Transport Protocol |
NSM |
Network Security Monitoring |
NSRL |
National Software Reference Library |
NTFS |
Windows NT File SystemNTI New Technologies, Inc. |
NTP |
Network Time ProtocolNW3C National White Collar Crime Center |
OAL |
OEM Adaption Layer |
ODBC |
Open Database Connectivity |
OEM |
Original Equipment Manufacturer |
OMB |
Office of Management and Budget |
OS |
Operating System |
OSI |
Open Systems Interconnect |
OSR2 |
OEM Service Release 2 |
PaaS |
Platform as a Service |
PATA |
Parallel ATA |
PCMCIA |
Personal Computer Memory Card International Association |
PDA |
personal digital assistant |
PEAP |
Protected EAP |
PIEID |
Preservation, identification, extraction, interpretation, documentation |
PIM |
Personal Information Management |
POP |
Post Office Protocol 3 |
POSE |
Palm Operating System Emulato |
rPPC |
Pocket PCPPI pixels per inch |
PPTP |
Point-to-Point Tunneling Protocol |
PRTK |
Password Recovery Toolkit |
QEMU |
Quick EMUlator |
RADIUS |
Remote Authentication Dial-In User Service |
RAID |
Redundant Array of Inexpensive Disks |
RAM |
Random Access Memory |
RAPI |
Remote Application Programming Interface |
RCFL |
Regional Computer Forensic Laboratory |
RCS |
Revision Control System |
RFC |
Request for Comment |
RIPE NCC |
Réseaux IP Européens Network Coordination Centre |
ROM |
Read-Only Memory |
RSA |
Rivest, Shamir, Adelson |
RSN |
Robust Security NetworkS3 Simple Storage Service |
SaaS |
Software as a Service |
SAM |
Security Account Manager |
SAN |
Storage Area Network |
SATA |
Serial ATA |
SCSI |
Small Computer System Interface |
SD |
Secure Digita |
lSDHC |
Secure Digital High Capacity |
SDK |
Software Development Kit |
SDMI |
Secure Digital Music Initiative |
SEM |
Security Event Management |
SFTP |
Secure FTP |
SHA-1 |
Secure Hash Algorithm 1 |
SIEM |
Security Information and Event Management |
SIM |
Subscriber Identity Module |
SIP |
Session Initiation Protocol |
SMB |
Server Message Block |
SME |
Subject Matter Expert |
SMS |
Short Message Service |
SMTP |
Simple Mail Transfer Protocol |
SNMP |
Simple Network Management Protocol |
SOHO |
Small Office/home Office |
SOP |
Standard Operational Procedure |
SP |
Special Publication |
SPL |
Search Processing Language |
SSD |
Solid-State Drive |
SSH |
Secure Shell |
SSID |
Service Set Identifier |
SSL |
Secure Sockets Layer |
STA |
stationSWGDE |
Scientific |
Working Group on Digital Evidence |
SWGIT |
Scientific Working Group on Imaging Technologies |
TAI |
International Atomic Time |
TB |
Terabyte |
TCP |
Transmission Control Protocol |
TCP/IP |
Transmission Control Protocol/Internet Protocol |
TDMA |
Time Division Multiple Access |
TFT |
Tthin film Transfer |
TOR |
The Onion Router |
UART |
Universal Asynchronous Receiver/Transmitter |
UDF |
Universal Disk Format |
UDP |
User Datagram Protocol |
UFS |
UNIX File System |
UICC |
Universal Integrated Circuit Card |
UMTS |
Universal Mobile Telecommunications System |
UPS |
Uninterruptible Power Supply |
URL |
Uniform Resource Locator |
USB |
Universal serial bus |
USC |
United States Code |
USIM |
UMTS Subscriber Identity Module |
UTC |
Universal Coordinated Time |
VERIS |
Vocabulary for Event Recording and Incident Sharing |
VLC |
VideoLAN client (now just VLC) media player |
VMFS |
VMware File System |
VoIP |
Voice over IP |
VPN |
Virtual Private Network |
WAF |
Web Application Firewall |
WAP |
Wireless Access Point |
WEP |
Wired Equivalent Privacy |
Wi-Fi |
Wireless Fidelity |
WINCE |
Windows CE |
WLAN |
Wireless LAN |
WORM |
Write once, read many |
WPA |
Wireless Protected Access |
WPA2 |
Wireless Protected Access version 2 |
XIP |
eXecute in Place |