انطلاقًا من تعزيز العمل الأمني العربي المشترك، أصدرت «جامعة نايف العربية للعلوم الأمنية» معجمًا مُتَخَصِّصًا في مصطلحات الجرائم السيبرانية والأدلة الرقمية؛ ليكون مرجعًا استرشاديًّا للعاملين في النيابات العامة، والمحاكم ذات الصلة، وجهات الضبط والاستدلال، والباحثين والأكاديميين والإعلاميين الأمنيين في الدول العربية. وتأتي أهمية هذا المعجم بسبب تسارع التطور التقني والتحول الرقمي في المجتمعات العربية والاستخدام الواسع للأجهزة الإلكترونية في شتى جوانب الحياة، وهو ما أدى إلى استحداث أنماط وأساليب إجرامية. وأصبحت هذه التقنيات مُسَهِّلَةً لارتكاب الجرائم التقليدية وأداةً لارتكاب الجرائم السيبرانية، وتحولت هذه الجرائم إلى جرائم عابرة للحدود. وأنتجت هذه الأجهزة الإلكترونية أدلةً رقميةً، وهو ما يتطلب سرعةً في تبادل هذه الأدلة بين الدول العربية؛ لتحقيق العدالة وحفظ الأمن السيبراني من المجرمين والإرهابيين والخارجين عن النظام.ويُعَدُّ غيابُ التعريفاتِ العلميةِ الدقيقةِ في المحتوى العربي للمصطلحات في مجالي الجرائم السيبرانية والأدلة الرقمية أحدَ التحدياتِ التي تواجه الجهات الأمنية وصُنَّاعَ القرارِ في الدول العربية؛ بسبب قلة المصادر العربية المتخصصة، وقلة الترجمة العربية المتفق عليها بين المختصين والخبراء العرب في هذين المجالين، خاصة أننا مُقْبِلُون على طفرات تقنية في الأعوام المقبلة. وتُعَدُّ هذه المبادرةُ اللبنةَ الأولى لبناءِ معجم (إنجليزي - عربي) مستدام متخصص في إثراء المحتوى العربي في مجالات مكافحة الجرائم السيبرانية والأدلة الرقمية. ويضمُّ المعجمُ أكثرَ من 700 مصطلحٍ لأنواع الجرائم السيبرانية والأدلة الرقمية ومصادرها، والتقنيات المرتبطة بالفضاء السيبراني.وَقَدْ تَمَيَّزَ هذا المعجمُ بمراجعةِ خبراء إقليميين ودوليين من جهات أكاديمية وجهات إنفاذ القانون ومنظمات أمنية دولية متخصصة لهذه المصطلحات؛ حيث تمت مراجعة المصطلحات العربية لهذا المعجم من قِبَلِ مجموعة من الخبراء والممارسين العرب في مجالات مكافحة الجرائم السيبرانية والأدلة الرقمية. ولكون الجامعة عضوًا مؤسسًا في أكاديمية الإنتربول العالمية فقد راجعَ أعضاءُ الأكاديميةِ وخبراءُ إدارةِ الجرائمِ السيبرانيةِ بالإنتربول مصطلحات المعجم الإنجليزية، وراجعها أيضًا أكاديميون متخصصون من الجامعة الكورية.ومن المتوقع أن يستفيد من هذا المعجم جهاتُ إنفاذ القانون والتحقيق، والقضاة، والمحامون، والإعلاميون المتخصصون، والأكاديميون، والباحثون، وطلاب الجامعات من 22 دولة عربية. ولتحقيق الاستدامة وضمان الاستمرارية، سوف تكون هذه المبادرة مستمرةً ومتاحةً لجميع المهتمين عن طريق إستراتيجية حشد المصادر (Crowdsourcing)؛ نظرًا لطبيعة هذه الجرائم وتطورها السريع ولإثراء المحتوى العربي في مجالات مكافحة الجرائم السيبرانية والأدلة الرقمية. وسوف يقوم مركز الجرائم السيبرانية والأدلة الرقمية في المرحلة القادمة بتطوير منصةٍ إلكترونيةٍ تتيح مشاركة جميع الخبراء والممارسين والمختصين والباحثين في هذه المجالات من جميع الدول العربية.
actionfraud.police.uk https://www.actionfraud.police.uk/a-z-of-fraud/ticket-scams
answers.microsoft.com https://answers.microsoft.com/en-us/windows/forum/all/what-is-the-ntuserdat-file/fd3f2951-1691-4caf-ba1e-97864b1e2a57
apa.org https://www.apa.org/topics/bullying/cyberbullying-online-social-media
assets.ctfassets.net https://assets.ctfassets.net/kvf8rpi09wgk/1I5QEh9acXaf9RfbQFspVV/2296b5a7b94262023acc0aec49f3db2d/Computer_Hacking_and_Forensics_Glossary__1_.pdf
atlasvpn.com https://atlasvpn.com/blog/what-is-a-deauthentication-attack
atmeye.com https://atmeye.com/blog/what-is-atm-fraud/
attack.mitre.org https://attack.mitre.org/
autopsy.com https://www.autopsy.com/
avast.com https://www.avast.com/c-what-is-ssd
azure.microsoft.com https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/
barprephero.com https://barprephero.com/legal-terms/evidence/identification-evidence/
bergerandgreen.com https://www.bergerandgreen.com/glossary/justification/
bitdefender.com https://www.bitdefender.com/blog/hotforsecurity/crime-in-the-metaverse-police-face-new-challenges-in-a-virtual-world/
bjs.ojp.gov https://bjs.ojp.gov/node/63761
blog.chainalysis.com https://blog.chainalysis.com/reports/crypto-laundering/
blog.f-secure.com https://blog.f-secure.com/what-are-state-sponsored-cyberattacks/
brightdata.com https://brightdata.com/blog/web-data/what-is-data-parsing
britannica.com https://www.britannica.com/technology/
burgessforensics.com https://burgessforensics.com/computer-forensics-glossary/
capec.mitre.org https://capec.mitre.org/data/definitions/89.html
cdc.gov https://www.cdc.gov/phlp/publications/topic/hipaa.html
cellebrite.com https://cellebrite.com/en/glossary/allocated-space-digital-forensics/
cgaa.org https://www.cgaa.org/article/what-is-a-hoax
cisa.gov https://www.cisa.gov/news-events/
cisco.com https://www.cisco.com/c/en/us/products/
cloudflare.com https://www.cloudflare.com/learning/
coinbase.com https://www.coinbase.com/learn/crypto-basics/what-is-mining
collinsdictionary.com https://www.collinsdictionary.com/dictionary/english/extortion
computerhope.com https://www.computerhope.com/jargon/s/smartphone.htm
consumer.ftc.gov https://consumer.ftc.gov/articles/
crowdstrike.com https://www.crowdstrike.com/cybersecurity-101
csoonline.com https://www.csoonline.com/article/3568794/what-is-a-dictionary-attack-and-how-you-can-easily-stop-them.html
csrc.nist.gov https://csrc.nist.gov/glossary/
cyber.nj.gov https://www.cyber.nj.gov/informational-report/the-internet-of-insecure-things
dcc.edu https://www.dcc.edu/administration/offices/information-technology/zoom/zoom-bombing.aspx
developer.apple.com https://developer.apple.com/documentation
dfw-forensics.com https://dfw-forensics.com/2021/04/13/container-forensics/
dhs.gov https://www.dhs.gov/radio-frequency-identification-rfid-what-it
digital.nhs.uk https://digital.nhs.uk/cyber-and-data-security/about-us/cyber-security-glossary
disb.dc.gov https://disb.dc.gov/page/beware-qr-code-scams
discoverdatascience.org https://www.discoverdatascience.org/articles/everything-you-need-to-know-about-how-to-use-deepfake/
dl.acm.org https://dl.acm.org/doi/abs/10.1145/3372823
docs.jamf.com https://docs.jamf.com/customer-education/jamf-100-course/5.0/Lesson_9_macOS_File_Storage_Structure.html
doubleoctopus.com https://doubleoctopus.com/security-wiki/threats-and-tools/wi-fi-eavesdropping/
dualog.com https://www.dualog.com/blog/what-are-command-and-control-c2-callbacks
dynamics.microsoft.com https://dynamics.microsoft.com/en-us/erp/what-is-erp/
easytechjunkie.com https://www.easytechjunkie.com/what-is-a-virtual-crime-scene.htm
edrm.net https://edrm.net/resources/frameworks-and-standards/edrm-model/identification/
education.vic.gov.au https://www.education.vic.gov.au/Documents/about/programs/bullystoppers/smgrooming.pdf
educative.io https://www.educative.io/answers/what-are-iot-attacks
encyclopedia.kaspersky.com https://encyclopedia.kaspersky.com/glossary/deface/
esafety.gov.au https://www.esafety.gov.au/
eurojust.europa.eu https://www.eurojust.europa.eu/annual-report-2021/securing-evidence/tackling-cybercrime-as-service
exterro.com https://www.exterro.com/
extrahop.com https://www.extrahop.com/resources/attacks/cryptomining/
faa.gov https://www.faa.gov/faq/what-unmanned-aircraft-system-uas
fbi.gov https://www.fbi.gov/investigate/terrorism
fcc.gov https://www.fcc.gov/scam-glossary
fema.gov https://www.fema.gov/authorized-equipment-list-item/03oe-07-suas
fileinfo.com https://fileinfo.com/extension/catalog
fletc.gov https://www.fletc.gov/jtag-chipoff-smartphones-training-program
forensicmag.com https://www.forensicmag.com/3425-Featured-Article-List/583590-Isolating-Devices-to-Preserve-Evidence/
forensicsdigest.com https://forensicsdigest.com/mac-os-file-system/
fortinet.com https://www.fortinet.com/resources/cyberglossary/
fraud.net https://fraud.net/d/
ftc.gov https://www.ftc.gov/
gartner.com https://www.gartner.com/en/information-technology/glossary/
geeksforgeeks.org https://www.geeksforgeeks.org/understanding-rainbow-table-attack/
gemini.com https://www.gemini.com/cryptopedia/crypto-cold-storage-brain-wallets
gibsondunn.com https://www.gibsondunn.com/e-discovery-basics-production-of-esi-vol-1-no-9/
github.com https://github.com/volatilityfoundation/volatility
gkm2.com.au https://gkm2.com.au/juice-jacking-attack/
gov.uk https://www.gov.uk/government/publications/hmrc-issue-briefing-hmrcs-approach-to-tax-fraud/hmrcs-approach-to-tax-fraud
gps.gov https://www.gps.gov/systems/
hashcat.net https://hashcat.net/hashcat/
headjam.com.au https://www.headjam.com.au/knowledge-base/answer/what-is-the-difference-between-uploading-and-downloading
home.treasury.gov https://home.treasury.gov/policy-issues/terrorism-and-illicit-finance/money-laundering
iacc.org https://www.iacc.org/resources/about/what-is-counterfeiting
IACP Law Enforcement Cyber Center https://www.iacpcybercenter.org/resources-2/glossary/
ibm.com https://www.ibm.com/topics/
icann.org https://www.icann.org/en/blogs/details/the-dark-web-the-land-of-hidden-services-27-6-2017-en
identiv.com https://www.identiv.com/resources/blog/what-are-rfid-tags-and-how-are-they-used
igi-global.com https://www.igi-global.com/dictionary/quality-service-mobile-hoc-networks/30805
imo.org https://www.imo.org/en/OurWork/Safety/Pages/LRIT.aspx
infoguardsecurity.com https://www.infoguardsecurity.com/what-is-scam-and-types-of-scam/
infosecawareness.in https://infosecawareness.in/concept/children/online-predators
infosecwriteups.com https://infosecwriteups.com/dll-injection-dllinjector-d1b30c6760eb
internetsafetystatistics.com https://www.internetsafetystatistics.com/what-is-cyber-fraud/
interpol.int https://www.interpol.int/content/download/16243/file/Guidelines_to_Digital_Forensics_First_Responders_V7.pdf
investor.gov https://www.investor.gov/protect-your-investments/fraud/types-fraud/
isaca.org https://www.isaca.org/resources/news-and-trends/industry-news/2018/combatting-fileless-malware
it.nc.gov https://it.nc.gov/documents/cybersecurity-newsletters/2019/esrmo-newsletter-september-2019/download?attachment
itgovernance.co.uk https://www.itgovernance.co.uk/blog/what-is-the-iso-27000-series-of-standards
javatpoint.com https://www.javatpoint.com/what-is-recycle-bin
jdsupra.com https://www.jdsupra.com/legalnews/preservation-of-evidence-methods-and-9317866/
jetico.com https://www.jetico.com/data-encryption
judicature.duke.edu https://judicature.duke.edu/articles/data-visualization-what-is-it-and-can-you-trust-it/
justice.gov https://www.justice.gov/
kaspersky.com https://www.kaspersky.com/resource-center/definitions/
law.cornell.edu https://www.law.cornell.edu/
lawinsider.com https://www.lawinsider.com/dictionary/
learn.microsoft.com https://learn.microsoft.com/en-us/
learnvern.com https://www.learnvern.com/cyber-forensics-course/disk-partition
legaldictionary.net https://legaldictionary.net/
legal-dictionary.thefreedictionary.com https://legal-dictionary.thefreedictionary.com/espionage
legalmatch.com https://www.legalmatch.com/law-library/article/what-is-contract-fraud.html
lindahall.org https://www.lindahall.org/experience/digital-exhibitions/connecting-the-dots/03-trace
link.springer.com https://link.springer.com/referenceworkentry/10.1007/978-0-387-39940-9_417
magnetforensics.com https://www.magnetforensics.com/products/magnet-axiom-cyber/
makeuseof.com https://www.makeuseof.com/what-is-wiper-malware/
manageengine.com https://www.manageengine.com/vulnerability-management/misconfiguration/
mass.gov https://www.mass.gov/info-details/
mcafee.com https://www.mcafee.com/learn/what-is-gps-spoofing/
mckinsey.com https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-the-internet-of-things
michigan.gov https://www.michigan.gov/difs/consumers/fraud/what-is-insurance-fraud
mobileforensicsolutions.tech https://mobileforensicsolutions.tech/chip-off-examinations/
mtu.edu https://www.mtu.edu/it/security/information-security-plan/4-definitions/
mylawquestions.com https://www.mylawquestions.com/what-is-evidence-analysis.htm
nacdl.org https://www.nacdl.org/getattachment/e30285fa-61eb-4b71-9bdb-6458b7140dc9/common-digital-forensics-terms-acronyms-and-certifications-1-.pdf
nafo.int https://www.nafo.int/Fisheries/ReportingRequirements/VMS
netresec.com https://www.netresec.com/?page=NetworkMiner
niccs.cisa.gov https://niccs.cisa.gov/
nist.gov https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/glossary
nnlm.gov https://www.nnlm.gov/guides/data-glossary/web-scraping
norfolk.police.uk https://www.norfolk.police.uk/advice/cybercrime/1-what-cybercrime
ojp.gov https://www.ojp.gov/pdffiles1/nij/254661.pdf
opensource.com https://opensource.com/article/17/5/introduction-ext4-filesystem
opentext.com https://www.opentext.com/products/encase-forensic
osforensics.com https://www.osforensics.com/
owasp.org https://owasp.org/
oxygenforensics.com https://oxygenforensics.com/en/products/oxygen-forensic-detective/
pages.nist.gov https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-0.html
patents.google.com https://patents.google.com/patent/CA2603315C/sv
pcmag.com https://www.pcmag.com/encyclopedia/term
percipient.co https://percipient.co/overview-the-three-types-of-forensic-collections-physical-vs-logical-vs-targeted/
podcastle.ai https://podcastle.ai/blog/what-is-voice-cloning/
police.qld.gov.au https://www.police.qld.gov.au/safety-and-preventing-crime/r-u-in-control/internet-auction-fraud
police1.com https://www.police1.com/chiefs-sheriffs/articles/16-features-to-look-for-in-a-digital-evidence-management-system-dems-34OPR6vui29EJx2z/
portal.311.nyc.gov https://portal.311.nyc.gov/article/?kanumber=KA-01611
portswigger.net https://portswigger.net/web-security/file-upload
precisely.com https://www.precisely.com/glossary/deduplication
privacysense.net https://www.privacysense.net/terms/shoulder-surfing/
professormesser.com https://www.professormesser.com/security-plus/sy0-401/christmas-tree-attack-2/
proofpoint.com https://www.proofpoint.com/us/threat-reference/
radiotimes.com https://www.radiotimes.com/technology/what-is-a-smart-speaker/
recoverit.wondershare.com https://recoverit.wondershare.com/partition-tips/what-is-partition-table.html
reportandsupport.durham.ac.uk https://reportandsupport.durham.ac.uk/support/what-is-online-harassment
safeguardingchildren.co.uk https://www.safeguardingchildren.co.uk/parents-carers/child-exploitation/
saferderbyshire.gov.uk https://www.saferderbyshire.gov.uk/site-elements/documents/pdf/glossary-of-cyber-security-terms.pdf
sans.org https://www.sans.org/blog/what-is-open-source-intelligence/
scamwatch.gov.au https://www.scamwatch.gov.au/types-of-scams/investments/investment-scams
sciencedirect.com https://www.sciencedirect.com/topics/computer-science/cyberstalking
sciencedirect.com https://www.sciencedirect.com/science/article/
searchandseizure.org http://www.searchandseizure.org/consentsearches.html
securityboulevard.com https://securityboulevard.com/2022/07/7-common-internet-of-things-iot-attacks-that-compromise-security/
securitybrief.com.au https://securitybrief.com.au/story/hackers-increasingly-island-hopping-so-what-does-it-mean
seon.io https://seon.io/resources/
simplitfy.com https://www.simplitfy.com/news-sms-spoofing-what-is-it-and-how-can-you-avoid-sms-spoofing-fraud.html
skybrary.aero https://skybrary.aero/articles/introduction-remotely-piloted-aircraft-systems-rpas
sleuthkit.org https://www.sleuthkit.org/
solvusoft.com https://www.solvusoft.com/en/file-extensions/software/symantec-corporation/pgp-desktop/
sproutsocial.com https://sproutsocial.com/glossary/url-shortener/
sqasolar.org.uk https://www.sqasolar.org.uk/solar/material/IS01CGCD/page_03.htm
state.gov https://www.state.gov/darkside-ransomware-as-a-service-raas/
support.apple.com https://support.apple.com/
support.kaspersky.com https://support.kaspersky.com/KESWin/11.4.0/en-US/174954.htm
systemweakness.com https://systemweakness.com/hacking-wireless-networks-around-the-globe-practical-wifi-hacking-f8bdc36536b8
tech-faq.com https://www.tech-faq.com/truecrypt.html
techopedia.com https://www.techopedia.com/definition/
techtarget.com https://www.techtarget.com/whatis/definition/
techterms.com https://techterms.com/definition/puk_code
techwalla.com https://www.techwalla.com/articles/what-is-website-cloning
texasattorneygeneral.gov https://www.texasattorneygeneral.gov/consumer-protection/health-care/health-care-fraud-and-abuse
thecyberwire.com https://thecyberwire.com/glossary/
theiacp.org https://www.theiacp.org/sites/default/files/2018-07/RadicalizationtoViolentExtremismAwarenessBrief.pdf
thetechedvocate.org https://www.thetechedvocate.org/what-are-prefetch-files-in-windows-are-they-important/
theverge.com https://www.theverge.com/2023/1/26/23572604/watermark-removal-stock-images-shutterstock-getty-adobe
transparency.org https://www.transparency.org/en/corruptionary/tax-evasion
trellix.com https://www.trellix.com/en-us/security-awareness/operations/what-is-cyber-threat-hunting.html
trendmicro.com https://www.trendmicro.com/vinfo/us/security/definition/
trial.laws.com https://trial.laws.com/evidence/evidence-bag
trustedcomputinggroup.org https://trustedcomputinggroup.org/resource/trusted-platform-module-tpm-summary/
unodc.org https://www.unodc.org/e4j/zh/cybercrime/module-14/key-issues/cyberterrorism.html
us.norton.com https://us.norton.com/blog
vacourts.gov https://www.vacourts.gov/courts/overview/glossary_of_court_terms.html
veracrypt.fr https://www.veracrypt.fr/en/Home.html
verizon.com https://www.verizon.com/about/blog/isp-meaning
visa.com.au https://www.visa.com.au/content/dam/VCOM/download/merchants/Visa_Security_Alert_070114.pdf
wallstreetmojo.com https://www.wallstreetmojo.com/carding/
wipo.int https://www.wipo.int/about-ip/en/
wireshark.org https://www.wireshark.org/about.html
withpersona.com https://withpersona.com/blog/cryptocurrency-theft-statistics
www2.deloitte.com https://www2.deloitte.com/content/dam/Deloitte/xe/Documents/About-Deloitte/mepovdocuments/mepov13/dtme_mepov13_Procurement%20fraud.pdf
x-ways.net https://www.x-ways.net/winhex/forensics.html
ynvisible.com https://www.ynvisible.com/news-inspiration/what-is-smart-card
zylab.com https://www.zylab.com/en/blog/five-best-practices-for-digital-evidence-collection-and-preservation-for-internal-investigations-and-ediscovery
ensics.com https://www.504ensics.com/tools/spotlight-inspector-digital-forensics-app-for-mac-osx