Glossary of Key Terms in Cybercrimes and Digital Forensics: English – Arabic

Authors

Abdulrazaq Almorjan
Center of Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia
Seokhee Lee
Center of Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia
Ibrahim Al-Zahrani
Center of Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia
Sumaya Alshokeeran
Center of Cybercrime and Digital Forensics, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia

Keywords:

Cybercrimes, Forensics

Synopsis

Towards strengthening joint Arab security work, Naif Arab University for Security Sciences has published a specialized dictionary of cybercrime and digital forensics. This dictionary aims to serve as a comprehensive reference for public prosecutors, relevant courts, law enforcement agencies, researchers, academics, and security media professionals across Arab countries.

The importance of this dictionary stems from the rapid technological progress and digital transformation within Arab societies, coupled with the extensive use of electronic devices in everyday life. These advancements have introduced new criminal patterns and methods. Modern technologies now facilitate traditional crimes and enable cybercrime, which has evolved into cross-border crimes. Consequently, these devices produce digital evidence, necessitating swift exchange of this evidence among Arab countries to uphold justice and safeguard cybersecurity against criminals, terrorists, and lawbreakers.

One of the challenges facing security agencies and decision-makers in Arab countries is the lack of precise scientific definitions in the Arabic content of terms in the fields of cybercrime and digital forensics. This is due to the scarcity of specialized Arabic sources and the lack of approved translation among Arab experts and specialists in these fields, especially as we face imminent technological advancements in the coming years.

This initiative marks the initial step toward creating a sustainable English-Arabic dictionary tailored to enrich Arabic content in combating cybercrime and managing digital forensics. The dictionary contains over 700 terms related to various types of cybercrime, digital evidence, their sources, and associated cyberspace technologies.

The dictionary’s distinction lies in its thorough review by regional and international experts from academic institutions, law enforcement agencies, and specialized international security organizations. The Arabic terms were reviewed by Arab experts and practitioners in the fields of cybercrime and digital forensics. As the University is a founding member of the INTERPOL Global Academy, the dictionary’s English terms were reviewed by academy members, INTERPOL’s cybercrime experts, and specialized academics from Korea University.

This dictionary is expected to benefit law enforcement and investigative agencies, judges, lawyers, specialized media professionals, academics, researchers, and university students from 22 Arab countries.

To ensure sustainability and continuity, this initiative will remain ongoing and accessible to all interested parties through a crowdsourcing strategy, given the fast-evolving nature of these crimes and the necessity to enhance Arabic content in the fields of cybercrime and digital forensics. In the next phase, the Center of Cybercrimes and Digital Forensics will create an electronic platform that will enable experts, practitioners, specialists, and researchers from all Arab countries to participate and contribute.

actionfraud.police.uk https://www.actionfraud.police.uk/a-z-of-fraud/ticket-scams

answers.microsoft.com https://answers.microsoft.com/en-us/windows/forum/all/what-is-the-ntuserdat-file/fd3f2951-1691-4caf-ba1e-97864b1e2a57

apa.org https://www.apa.org/topics/bullying/cyberbullying-online-social-media

assets.ctfassets.net https://assets.ctfassets.net/kvf8rpi09wgk/1I5QEh9acXaf9RfbQFspVV/2296b5a7b94262023acc0aec49f3db2d/Computer_Hacking_and_Forensics_Glossary__1_.pdf

atlasvpn.com https://atlasvpn.com/blog/what-is-a-deauthentication-attack

atmeye.com https://atmeye.com/blog/what-is-atm-fraud/

attack.mitre.org https://attack.mitre.org/

autopsy.com https://www.autopsy.com/

avast.com https://www.avast.com/c-what-is-ssd

azure.microsoft.com https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/

barprephero.com https://barprephero.com/legal-terms/evidence/identification-evidence/

bergerandgreen.com https://www.bergerandgreen.com/glossary/justification/

bitdefender.com https://www.bitdefender.com/blog/hotforsecurity/crime-in-the-metaverse-police-face-new-challenges-in-a-virtual-world/

bjs.ojp.gov https://bjs.ojp.gov/node/63761

blog.chainalysis.com https://blog.chainalysis.com/reports/crypto-laundering/

blog.f-secure.com https://blog.f-secure.com/what-are-state-sponsored-cyberattacks/

brightdata.com https://brightdata.com/blog/web-data/what-is-data-parsing

britannica.com https://www.britannica.com/technology/

burgessforensics.com https://burgessforensics.com/computer-forensics-glossary/

capec.mitre.org https://capec.mitre.org/data/definitions/89.html

cdc.gov https://www.cdc.gov/phlp/publications/topic/hipaa.html

cellebrite.com https://cellebrite.com/en/glossary/allocated-space-digital-forensics/

cgaa.org https://www.cgaa.org/article/what-is-a-hoax

cisa.gov https://www.cisa.gov/news-events/

cisco.com https://www.cisco.com/c/en/us/products/

cloudflare.com https://www.cloudflare.com/learning/

coinbase.com https://www.coinbase.com/learn/crypto-basics/what-is-mining

collinsdictionary.com https://www.collinsdictionary.com/dictionary/english/extortion

computerhope.com https://www.computerhope.com/jargon/s/smartphone.htm

consumer.ftc.gov https://consumer.ftc.gov/articles/

crowdstrike.com https://www.crowdstrike.com/cybersecurity-101

csoonline.com https://www.csoonline.com/article/3568794/what-is-a-dictionary-attack-and-how-you-can-easily-stop-them.html

csrc.nist.gov https://csrc.nist.gov/glossary/

cyber.nj.gov https://www.cyber.nj.gov/informational-report/the-internet-of-insecure-things

dcc.edu https://www.dcc.edu/administration/offices/information-technology/zoom/zoom-bombing.aspx

developer.apple.com https://developer.apple.com/documentation

dfw-forensics.com https://dfw-forensics.com/2021/04/13/container-forensics/

dhs.gov https://www.dhs.gov/radio-frequency-identification-rfid-what-it

digital.nhs.uk https://digital.nhs.uk/cyber-and-data-security/about-us/cyber-security-glossary

disb.dc.gov https://disb.dc.gov/page/beware-qr-code-scams

discoverdatascience.org https://www.discoverdatascience.org/articles/everything-you-need-to-know-about-how-to-use-deepfake/

dl.acm.org https://dl.acm.org/doi/abs/10.1145/3372823

docs.jamf.com https://docs.jamf.com/customer-education/jamf-100-course/5.0/Lesson_9_macOS_File_Storage_Structure.html

doubleoctopus.com https://doubleoctopus.com/security-wiki/threats-and-tools/wi-fi-eavesdropping/

dualog.com https://www.dualog.com/blog/what-are-command-and-control-c2-callbacks

dynamics.microsoft.com https://dynamics.microsoft.com/en-us/erp/what-is-erp/

easytechjunkie.com https://www.easytechjunkie.com/what-is-a-virtual-crime-scene.htm

edrm.net https://edrm.net/resources/frameworks-and-standards/edrm-model/identification/

education.vic.gov.au https://www.education.vic.gov.au/Documents/about/programs/bullystoppers/smgrooming.pdf

educative.io https://www.educative.io/answers/what-are-iot-attacks

encyclopedia.kaspersky.com https://encyclopedia.kaspersky.com/glossary/deface/

esafety.gov.au https://www.esafety.gov.au/

eurojust.europa.eu https://www.eurojust.europa.eu/annual-report-2021/securing-evidence/tackling-cybercrime-as-service

exterro.com https://www.exterro.com/

extrahop.com https://www.extrahop.com/resources/attacks/cryptomining/

faa.gov https://www.faa.gov/faq/what-unmanned-aircraft-system-uas

fbi.gov https://www.fbi.gov/investigate/terrorism

fcc.gov https://www.fcc.gov/scam-glossary

fema.gov https://www.fema.gov/authorized-equipment-list-item/03oe-07-suas

fileinfo.com https://fileinfo.com/extension/catalog

fletc.gov https://www.fletc.gov/jtag-chipoff-smartphones-training-program

forensicmag.com https://www.forensicmag.com/3425-Featured-Article-List/583590-Isolating-Devices-to-Preserve-Evidence/

forensicsdigest.com https://forensicsdigest.com/mac-os-file-system/

fortinet.com https://www.fortinet.com/resources/cyberglossary/

fraud.net https://fraud.net/d/

ftc.gov https://www.ftc.gov/

gartner.com https://www.gartner.com/en/information-technology/glossary/

geeksforgeeks.org https://www.geeksforgeeks.org/understanding-rainbow-table-attack/

gemini.com https://www.gemini.com/cryptopedia/crypto-cold-storage-brain-wallets

gibsondunn.com https://www.gibsondunn.com/e-discovery-basics-production-of-esi-vol-1-no-9/

github.com https://github.com/volatilityfoundation/volatility

gkm2.com.au https://gkm2.com.au/juice-jacking-attack/

gov.uk https://www.gov.uk/government/publications/hmrc-issue-briefing-hmrcs-approach-to-tax-fraud/hmrcs-approach-to-tax-fraud

gps.gov https://www.gps.gov/systems/

hashcat.net https://hashcat.net/hashcat/

headjam.com.au https://www.headjam.com.au/knowledge-base/answer/what-is-the-difference-between-uploading-and-downloading

home.treasury.gov https://home.treasury.gov/policy-issues/terrorism-and-illicit-finance/money-laundering

iacc.org https://www.iacc.org/resources/about/what-is-counterfeiting

IACP Law Enforcement Cyber Center https://www.iacpcybercenter.org/resources-2/glossary/

ibm.com https://www.ibm.com/topics/

icann.org https://www.icann.org/en/blogs/details/the-dark-web-the-land-of-hidden-services-27-6-2017-en

identiv.com https://www.identiv.com/resources/blog/what-are-rfid-tags-and-how-are-they-used

igi-global.com https://www.igi-global.com/dictionary/quality-service-mobile-hoc-networks/30805

imo.org https://www.imo.org/en/OurWork/Safety/Pages/LRIT.aspx

infoguardsecurity.com https://www.infoguardsecurity.com/what-is-scam-and-types-of-scam/

infosecawareness.in https://infosecawareness.in/concept/children/online-predators

infosecwriteups.com https://infosecwriteups.com/dll-injection-dllinjector-d1b30c6760eb

internetsafetystatistics.com https://www.internetsafetystatistics.com/what-is-cyber-fraud/

interpol.int https://www.interpol.int/content/download/16243/file/Guidelines_to_Digital_Forensics_First_Responders_V7.pdf

investor.gov https://www.investor.gov/protect-your-investments/fraud/types-fraud/

isaca.org https://www.isaca.org/resources/news-and-trends/industry-news/2018/combatting-fileless-malware

it.nc.gov https://it.nc.gov/documents/cybersecurity-newsletters/2019/esrmo-newsletter-september-2019/download?attachment

itgovernance.co.uk https://www.itgovernance.co.uk/blog/what-is-the-iso-27000-series-of-standards

javatpoint.com https://www.javatpoint.com/what-is-recycle-bin

jdsupra.com https://www.jdsupra.com/legalnews/preservation-of-evidence-methods-and-9317866/

jetico.com https://www.jetico.com/data-encryption

judicature.duke.edu https://judicature.duke.edu/articles/data-visualization-what-is-it-and-can-you-trust-it/

justice.gov https://www.justice.gov/

kaspersky.com https://www.kaspersky.com/resource-center/definitions/

law.cornell.edu https://www.law.cornell.edu/

lawinsider.com https://www.lawinsider.com/dictionary/

learn.microsoft.com https://learn.microsoft.com/en-us/

learnvern.com https://www.learnvern.com/cyber-forensics-course/disk-partition

legaldictionary.net https://legaldictionary.net/

legal-dictionary.thefreedictionary.com https://legal-dictionary.thefreedictionary.com/espionage

legalmatch.com https://www.legalmatch.com/law-library/article/what-is-contract-fraud.html

lindahall.org https://www.lindahall.org/experience/digital-exhibitions/connecting-the-dots/03-trace

link.springer.com https://link.springer.com/referenceworkentry/10.1007/978-0-387-39940-9_417

magnetforensics.com https://www.magnetforensics.com/products/magnet-axiom-cyber/

makeuseof.com https://www.makeuseof.com/what-is-wiper-malware/

manageengine.com https://www.manageengine.com/vulnerability-management/misconfiguration/

mass.gov https://www.mass.gov/info-details/

mcafee.com https://www.mcafee.com/learn/what-is-gps-spoofing/

mckinsey.com https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-the-internet-of-things

michigan.gov https://www.michigan.gov/difs/consumers/fraud/what-is-insurance-fraud

mobileforensicsolutions.tech https://mobileforensicsolutions.tech/chip-off-examinations/

mtu.edu https://www.mtu.edu/it/security/information-security-plan/4-definitions/

mylawquestions.com https://www.mylawquestions.com/what-is-evidence-analysis.htm

nacdl.org https://www.nacdl.org/getattachment/e30285fa-61eb-4b71-9bdb-6458b7140dc9/common-digital-forensics-terms-acronyms-and-certifications-1-.pdf

nafo.int https://www.nafo.int/Fisheries/ReportingRequirements/VMS

netresec.com https://www.netresec.com/?page=NetworkMiner

niccs.cisa.gov https://niccs.cisa.gov/

nist.gov https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/glossary

nnlm.gov https://www.nnlm.gov/guides/data-glossary/web-scraping

norfolk.police.uk https://www.norfolk.police.uk/advice/cybercrime/1-what-cybercrime

ojp.gov https://www.ojp.gov/pdffiles1/nij/254661.pdf

opensource.com https://opensource.com/article/17/5/introduction-ext4-filesystem

opentext.com https://www.opentext.com/products/encase-forensic

osforensics.com https://www.osforensics.com/

owasp.org https://owasp.org/

oxygenforensics.com https://oxygenforensics.com/en/products/oxygen-forensic-detective/

pages.nist.gov https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-0.html

patents.google.com https://patents.google.com/patent/CA2603315C/sv

pcmag.com https://www.pcmag.com/encyclopedia/term

percipient.co https://percipient.co/overview-the-three-types-of-forensic-collections-physical-vs-logical-vs-targeted/

podcastle.ai https://podcastle.ai/blog/what-is-voice-cloning/

police.qld.gov.au https://www.police.qld.gov.au/safety-and-preventing-crime/r-u-in-control/internet-auction-fraud

police1.com https://www.police1.com/chiefs-sheriffs/articles/16-features-to-look-for-in-a-digital-evidence-management-system-dems-34OPR6vui29EJx2z/

portal.311.nyc.gov https://portal.311.nyc.gov/article/?kanumber=KA-01611

portswigger.net https://portswigger.net/web-security/file-upload

precisely.com https://www.precisely.com/glossary/deduplication

privacysense.net https://www.privacysense.net/terms/shoulder-surfing/

professormesser.com https://www.professormesser.com/security-plus/sy0-401/christmas-tree-attack-2/

proofpoint.com https://www.proofpoint.com/us/threat-reference/

radiotimes.com https://www.radiotimes.com/technology/what-is-a-smart-speaker/

recoverit.wondershare.com https://recoverit.wondershare.com/partition-tips/what-is-partition-table.html

reportandsupport.durham.ac.uk https://reportandsupport.durham.ac.uk/support/what-is-online-harassment

safeguardingchildren.co.uk https://www.safeguardingchildren.co.uk/parents-carers/child-exploitation/

saferderbyshire.gov.uk https://www.saferderbyshire.gov.uk/site-elements/documents/pdf/glossary-of-cyber-security-terms.pdf

sans.org https://www.sans.org/blog/what-is-open-source-intelligence/

scamwatch.gov.au https://www.scamwatch.gov.au/types-of-scams/investments/investment-scams

sciencedirect.com https://www.sciencedirect.com/topics/computer-science/cyberstalking

sciencedirect.com https://www.sciencedirect.com/science/article/

searchandseizure.org http://www.searchandseizure.org/consentsearches.html

securityboulevard.com https://securityboulevard.com/2022/07/7-common-internet-of-things-iot-attacks-that-compromise-security/

securitybrief.com.au https://securitybrief.com.au/story/hackers-increasingly-island-hopping-so-what-does-it-mean

seon.io https://seon.io/resources/

simplitfy.com https://www.simplitfy.com/news-sms-spoofing-what-is-it-and-how-can-you-avoid-sms-spoofing-fraud.html

skybrary.aero https://skybrary.aero/articles/introduction-remotely-piloted-aircraft-systems-rpas

sleuthkit.org https://www.sleuthkit.org/

solvusoft.com https://www.solvusoft.com/en/file-extensions/software/symantec-corporation/pgp-desktop/

sproutsocial.com https://sproutsocial.com/glossary/url-shortener/

sqasolar.org.uk https://www.sqasolar.org.uk/solar/material/IS01CGCD/page_03.htm

state.gov https://www.state.gov/darkside-ransomware-as-a-service-raas/

support.apple.com https://support.apple.com/

support.kaspersky.com https://support.kaspersky.com/KESWin/11.4.0/en-US/174954.htm

systemweakness.com https://systemweakness.com/hacking-wireless-networks-around-the-globe-practical-wifi-hacking-f8bdc36536b8

tech-faq.com https://www.tech-faq.com/truecrypt.html

techopedia.com https://www.techopedia.com/definition/

techtarget.com https://www.techtarget.com/whatis/definition/

techterms.com https://techterms.com/definition/puk_code

techwalla.com https://www.techwalla.com/articles/what-is-website-cloning

texasattorneygeneral.gov https://www.texasattorneygeneral.gov/consumer-protection/health-care/health-care-fraud-and-abuse

thecyberwire.com https://thecyberwire.com/glossary/

theiacp.org https://www.theiacp.org/sites/default/files/2018-07/RadicalizationtoViolentExtremismAwarenessBrief.pdf

thetechedvocate.org https://www.thetechedvocate.org/what-are-prefetch-files-in-windows-are-they-important/

theverge.com https://www.theverge.com/2023/1/26/23572604/watermark-removal-stock-images-shutterstock-getty-adobe

transparency.org https://www.transparency.org/en/corruptionary/tax-evasion

trellix.com https://www.trellix.com/en-us/security-awareness/operations/what-is-cyber-threat-hunting.html

trendmicro.com https://www.trendmicro.com/vinfo/us/security/definition/

trial.laws.com https://trial.laws.com/evidence/evidence-bag

trustedcomputinggroup.org https://trustedcomputinggroup.org/resource/trusted-platform-module-tpm-summary/

unodc.org https://www.unodc.org/e4j/zh/cybercrime/module-14/key-issues/cyberterrorism.html

us.norton.com https://us.norton.com/blog

vacourts.gov https://www.vacourts.gov/courts/overview/glossary_of_court_terms.html

veracrypt.fr https://www.veracrypt.fr/en/Home.html

verizon.com https://www.verizon.com/about/blog/isp-meaning

visa.com.au https://www.visa.com.au/content/dam/VCOM/download/merchants/Visa_Security_Alert_070114.pdf

wallstreetmojo.com https://www.wallstreetmojo.com/carding/

wipo.int https://www.wipo.int/about-ip/en/

wireshark.org https://www.wireshark.org/about.html

withpersona.com https://withpersona.com/blog/cryptocurrency-theft-statistics

www2.deloitte.com https://www2.deloitte.com/content/dam/Deloitte/xe/Documents/About-Deloitte/mepovdocuments/mepov13/dtme_mepov13_Procurement%20fraud.pdf

x-ways.net https://www.x-ways.net/winhex/forensics.html

ynvisible.com https://www.ynvisible.com/news-inspiration/what-is-smart-card

zylab.com https://www.zylab.com/en/blog/five-best-practices-for-digital-evidence-collection-and-preservation-for-internal-investigations-and-ediscovery

ensics.com https://www.504ensics.com/tools/spotlight-inspector-digital-forensics-app-for-mac-osx

Cover Image

Downloads

Published

01-July-2024

Details about this monograph

ISBN-13 (15)

978-603-8361-73-3

Publication date (01)

2024-07-01

Physical Dimensions