Acronyms for the Certified Hacking Forensic Investigator Exam (312-49)

ACRONYM

FULL FORM

5WH  Who, what, when, where, why, and how?
ABA  American Bar Association
ADIA  Appliance for Digital Analysis and Investigation (ADIA)
ADS Alternate Data Stream
AMA  American Medical Association
AMI  Amazon Machine Instance
AP  access point
APA  American Psychological Association
APDU Application Protocol Data Unit
API  Application Programming Interface
ARIN American Registry for Internet Numbers
ARP Address Resolution Protocol
ASCFLD American Society of Crime Laboratory Directors
ASCII American Standard Code for Information Interchange
ASCII American Society of Digital Forensics and Electronic Discovery
ASDFED American Society of Digital Forensics and Electronic Discovery
ATA Advanced Technology Attachment
AWS Amazon Web Services
BC/DR  Business Continuity/disaster Recovery
BCD Binary Coded Decimal
BIOS Basic Input/output System
BSC Base Station Controller
BTS Base Transceiver Station
CART  Computer Analysis and Response Team
CAWFE  Certified Advanced Windows Forensic Examiner
CCE  Certified Computer Examiner
CCIPS  Computer Crime and Intellectual Property Section
CCTV Closed-Circuit Television
CD Compact Disc
CDFS CD file system
CD-R  CD-recordable
CD-ROM CD-read-only memory
CD-RW  CD-rewritable
CEH Certified Ethical Hacker
CF Compact Flash
CFCE Certified Forensic Computer Examiner
CFI Computer and financial investigations
CFRDC Computer Forensics Research and Development Center
CFReDS Computer Forensic Resource Data Sets
CFTT Computer Forensics Tool Testing
CFTT Computer Forensics Tool Test
CIDR Classless inter-domain routing protocol
CIR Consumer infrared
CMOS Complementary metal oxide semiconductor
CNIC Cellular network isolation card
CODEC Coder-decoder
CPA Certified Public Accountant
CSIM DMA Subscriber Identity Module
CSIRT Computer Security Incident Response Team
CSOC Computer Security Operations Center
CV Curriculum Vitae
CVE Common vulnerabilities and exposures
DART Digital Advanced Response Toolkitdd duplicate disk/data dump
DDoS Distributed denial of service
DHCP Dynamic Host Configuration Protocol
DLL Dynamic link library
DNA Distributed Network Access
DNS Domain Name System
DoD Department of Defense
DoS Denial of Service
DVD Digital Video Disc or Ddigital Versatile Disc
DVD-R DVD-recordable
DVD-ROM DVD-read-only memory
DVD-RW DVD-rewritable
EAP Extensible Authentication Protocol
EAP-TLS EAP with Transport Layer SecurityEC2 Elastic Compute Cloud
ECC Error Checking and Correction
EDGE Enhanced Data for GSM Evolution
EMS Enhanced Messenger Service
ES End System
ESN Electronic Serial Number
ETSI European Telecommunications Standards Institute
ESP Encapsulating Security Payload
ETI Enterprise Theory of Investigatione
UICC Embedded Universal Integrated Circuit Cardext2fs second extended file systemext3fs third extended file systemext4fs fourth extended file system
F.I.R.E. Forensic and Incident Response EnvironmentFACCI Florida Association of Computer Crime Investigators
FAT File Allocation Table
FBI Federal Bureau of Investigation
FCC  ID Federal Communications Commission Identification Number
FIPS Federal Information Processing Standards
FISMA Federal Information Security Management Act
FLETC Federal Law Enforcement Training Center
FOSS Free and Open-Source Software
FRCP Federal Rules of Civil Procedure
FRE Federal Rules of Evidence
FRED Forensic Recovery of Digital Evidence
FRED-L Forensic Recovery of Digital Evidence – Laptop
FTP File Transfer ProtocolGB gigabyte
GC Garbage Collection
GDI Graphics Device Interface
GPRS General Packet Radio Service
GPS Gglobal Positioning System
GSM Global System for Mobile Communications
GUI Graphical User Interface
GWES Graphics, Windowing, and Events Subsystem
HAL Hardware Abstraction Layer
HFS Hierarchical File System
HIPO Hierarchical Input-Process-Output
HKEY HIVE keyHPA host-protected area
HPFS High-Performance File System
HTCIA High Technology Crime Investigation Association
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
IaaS Infrastructure as a Service
IACIS International Association of Computer Investigative Specialists
IANA Internet Assigned Numbers Authority
ICCID Integrated circuit card identification
ICMP Internet Control Message ProtocolID identification
IDE Integrated Drive Electronics
iDEN Integrated Digital Enhanced Network
IDS Intrusion Ddetection Ssystem
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IGMP Internet Group Management Protocol
IIS Internet Information Server
IM Instant messaging
IMAP Internet Message Access Protocol
IMEI International Mobile Equipment Identity
IMSI International Mobile Subscriber Identity
IOCE International Organization on Computer Evidence
IOS Internetwork Operating System
IP Internet Protocol
Ipsec Internet Protocol Security
IR Interagency report
IRC Internet Relay Chat
IrDA Infrared Data Association
IRQ Interrupt Request Line
IS Intermediate System (a router or gateway)
ISFCE International Society of Forensic Computer Examiners
ISO International Organization for Standardization
ISP Internet Service Provider
IT Information Technology
ITL Information Technology Laboratory
JPEG Joint Photographic Experts GroupJTAG Joint Test Action Group
KB Kilobyte
LACNIC Latin American and Caribbean IP Network Information Centre
LAN Local Area Network
LBA Logical block addressing
LCD Liquid crystal display
LED Light-emitting diode
LND Last numbers dialed
MAC Modification, access, and creation
MAC Media Access Control
MACE Modified, accessed, created or entry modified
MAN Metropolitan Area Network
MATLAB Mathematics Laboratory
MB MegabyteMBR Master Bboot Record
MD Message DigestMD5 Message Digest 5
MEID Mobile Eequipment Identifier
MFT Master File Table
MISTI MIS Training Institute
MMC Multimedia card
MO Magneto-Ooptical
MPE+ Mobile Phone Examiner Plus
MSC Mobile Switching Center
MS-DOS Microsoft Disk Operating System
MSISDN Mobile Subscriber Integrated Services Digital Network
NAS Network Accessible Storage
NAT Network Address Translation
NetBIOS Network BIOS
NFA Network Forensic Analysis Tool
NFC Near-field Communication
nNFS Network File Sharing
NIC Network Interface Card
NIJ National Institute of Justice
NIST National Institute of Standards and Technology
NLECTC-NE National Law Enforcement and Corrections Technology Center, North East
NNTP Network News Transport Protocol
NSM Network Security Monitoring
NSRL National Software Reference Library
NTFS Windows NT File SystemNTI New Technologies, Inc.
NTP Network Time ProtocolNW3C National White Collar Crime Center
OAL OEM Adaption Layer
ODBC Open Database Connectivity
OEM Original Equipment Manufacturer
OMB Office of Management and Budget
OS Operating System
OSI Open Systems Interconnect
OSR2 OEM Service Release 2
PaaS Platform as a Service
PATA Parallel ATA
PCMCIA Personal Computer Memory Card International Association
PDA personal digital assistant
PEAP Protected EAP
PIEID Preservation, identification, extraction, interpretation, documentation
PIM Personal Information Management
POP Post Office Protocol 3
POSE Palm Operating System Emulato
rPPC Pocket PCPPI pixels per inch
PPTP Point-to-Point Tunneling Protocol
PRTK Password Recovery Toolkit
QEMU Quick EMUlator
RADIUS Remote Authentication Dial-In User Service
RAID Redundant Array of Inexpensive Disks
RAM Random Access Memory
RAPI Remote Application Programming Interface
RCFL Regional Computer Forensic Laboratory
RCS Revision Control System
RFC Request for Comment
RIPE NCC Réseaux IP Européens Network Coordination Centre
ROM Read-Only Memory
RSA Rivest, Shamir, Adelson
RSN Robust Security NetworkS3 Simple Storage Service
SaaS Software as a Service
SAM Security Account Manager
SAN Storage Area Network
SATA Serial ATA
SCSI Small Computer System Interface
SD Secure Digita
lSDHC Secure Digital High Capacity
SDK Software Development Kit
SDMI Secure Digital Music Initiative
SEM Security Event Management
SFTP Secure FTP
SHA-1 Secure Hash Algorithm 1
SIEM Security Information and Event Management
SIM Subscriber Identity Module
SIP Session Initiation Protocol
SMB Server Message Block
SME Subject Matter Expert
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SOHO Small Office/home Office
SOP Standard Operational Procedure
SP Special Publication
SPL Search Processing Language
SSD Solid-State Drive
SSH Secure Shell
SSID Service Set Identifier
SSL Secure Sockets Layer
STA stationSWGDE
Scientific Working Group on Digital Evidence
SWGIT Scientific Working Group on Imaging Technologies
TAI International Atomic Time
TB Terabyte
TCP Transmission Control Protocol
TCP/IP Transmission Control Protocol/Internet Protocol
TDMA Time Division Multiple Access
TFT Tthin film Transfer
TOR The Onion Router
UART Universal Asynchronous Receiver/Transmitter
UDF Universal Disk Format
UDP User Datagram Protocol
UFS UNIX File System
UICC Universal Integrated Circuit Card
UMTS Universal Mobile Telecommunications System
UPS Uninterruptible Power Supply
URL Uniform Resource Locator
USB Universal serial bus
USC United States Code
USIM UMTS Subscriber Identity Module
UTC Universal Coordinated Time
VERIS Vocabulary for Event Recording and Incident Sharing
VLC VideoLAN client (now just VLC) media player
VMFS VMware File System
VoIP Voice over IP
VPN Virtual Private Network
WAF Web Application Firewall
WAP Wireless Access Point
WEP Wired Equivalent Privacy
Wi-Fi Wireless Fidelity
WINCE Windows CE
WLAN Wireless LAN
WORM Write once, read many
WPA Wireless Protected Access
WPA2 Wireless Protected Access version 2
XIP eXecute in Place