Towards strengthening joint Arab security work, Naif Arab University for Security Sciences has published a specialized dictionary of cybercrime and digital forensics. This dictionary aims to serve as a comprehensive reference for public prosecutors, relevant courts, law enforcement agencies, researchers, academics, and security media professionals across Arab countries.
The importance of this dictionary stems from the rapid technological progress and digital transformation within Arab societies, coupled with the extensive use of electronic devices in everyday life. These advancements have introduced new criminal patterns and methods. Modern technologies now facilitate traditional crimes and enable cybercrime, which has evolved into cross-border crimes. Consequently, these devices produce digital evidence, necessitating swift exchange of this evidence among Arab countries to uphold justice and safeguard cybersecurity against criminals, terrorists, and lawbreakers.
One of the challenges facing security agencies and decision-makers in Arab countries is the lack of precise scientific definitions in the Arabic content of terms in the fields of cybercrime and digital forensics. This is due to the scarcity of specialized Arabic sources and the lack of approved translation among Arab experts and specialists in these fields, especially as we face imminent technological advancements in the coming years.
This initiative marks the initial step toward creating a sustainable English-Arabic dictionary tailored to enrich Arabic content in combating cybercrime and managing digital forensics. The dictionary contains over 700 terms related to various types of cybercrime, digital evidence, their sources, and associated cyberspace technologies.
The dictionary’s distinction lies in its thorough review by regional and international experts from academic institutions, law enforcement agencies, and specialized international security organizations. The Arabic terms were reviewed by Arab experts and practitioners in the fields of cybercrime and digital forensics. As the University is a founding member of the INTERPOL Global Academy, the dictionary’s English terms were reviewed by academy members, INTERPOL’s cybercrime experts, and specialized academics from Korea University.
This dictionary is expected to benefit law enforcement and investigative agencies, judges, lawyers, specialized media professionals, academics, researchers, and university students from 22 Arab countries.
To ensure sustainability and continuity, this initiative will remain ongoing and accessible to all interested parties through a crowdsourcing strategy, given the fast-evolving nature of these crimes and the necessity to enhance Arabic content in the fields of cybercrime and digital forensics. In the next phase, the Center of Cybercrimes and Digital Forensics will create an electronic platform that will enable experts, practitioners, specialists, and researchers from all Arab countries to participate and contribute.
actionfraud.police.uk https://www.actionfraud.police.uk/a-z-of-fraud/ticket-scams
answers.microsoft.com https://answers.microsoft.com/en-us/windows/forum/all/what-is-the-ntuserdat-file/fd3f2951-1691-4caf-ba1e-97864b1e2a57
apa.org https://www.apa.org/topics/bullying/cyberbullying-online-social-media
assets.ctfassets.net https://assets.ctfassets.net/kvf8rpi09wgk/1I5QEh9acXaf9RfbQFspVV/2296b5a7b94262023acc0aec49f3db2d/Computer_Hacking_and_Forensics_Glossary__1_.pdf
atlasvpn.com https://atlasvpn.com/blog/what-is-a-deauthentication-attack
atmeye.com https://atmeye.com/blog/what-is-atm-fraud/
attack.mitre.org https://attack.mitre.org/
autopsy.com https://www.autopsy.com/
avast.com https://www.avast.com/c-what-is-ssd
azure.microsoft.com https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/
barprephero.com https://barprephero.com/legal-terms/evidence/identification-evidence/
bergerandgreen.com https://www.bergerandgreen.com/glossary/justification/
bitdefender.com https://www.bitdefender.com/blog/hotforsecurity/crime-in-the-metaverse-police-face-new-challenges-in-a-virtual-world/
bjs.ojp.gov https://bjs.ojp.gov/node/63761
blog.chainalysis.com https://blog.chainalysis.com/reports/crypto-laundering/
blog.f-secure.com https://blog.f-secure.com/what-are-state-sponsored-cyberattacks/
brightdata.com https://brightdata.com/blog/web-data/what-is-data-parsing
britannica.com https://www.britannica.com/technology/
burgessforensics.com https://burgessforensics.com/computer-forensics-glossary/
capec.mitre.org https://capec.mitre.org/data/definitions/89.html
cdc.gov https://www.cdc.gov/phlp/publications/topic/hipaa.html
cellebrite.com https://cellebrite.com/en/glossary/allocated-space-digital-forensics/
cgaa.org https://www.cgaa.org/article/what-is-a-hoax
cisa.gov https://www.cisa.gov/news-events/
cisco.com https://www.cisco.com/c/en/us/products/
cloudflare.com https://www.cloudflare.com/learning/
coinbase.com https://www.coinbase.com/learn/crypto-basics/what-is-mining
collinsdictionary.com https://www.collinsdictionary.com/dictionary/english/extortion
computerhope.com https://www.computerhope.com/jargon/s/smartphone.htm
consumer.ftc.gov https://consumer.ftc.gov/articles/
crowdstrike.com https://www.crowdstrike.com/cybersecurity-101
csoonline.com https://www.csoonline.com/article/3568794/what-is-a-dictionary-attack-and-how-you-can-easily-stop-them.html
csrc.nist.gov https://csrc.nist.gov/glossary/
cyber.nj.gov https://www.cyber.nj.gov/informational-report/the-internet-of-insecure-things
dcc.edu https://www.dcc.edu/administration/offices/information-technology/zoom/zoom-bombing.aspx
developer.apple.com https://developer.apple.com/documentation
dfw-forensics.com https://dfw-forensics.com/2021/04/13/container-forensics/
dhs.gov https://www.dhs.gov/radio-frequency-identification-rfid-what-it
digital.nhs.uk https://digital.nhs.uk/cyber-and-data-security/about-us/cyber-security-glossary
disb.dc.gov https://disb.dc.gov/page/beware-qr-code-scams
discoverdatascience.org https://www.discoverdatascience.org/articles/everything-you-need-to-know-about-how-to-use-deepfake/
dl.acm.org https://dl.acm.org/doi/abs/10.1145/3372823
docs.jamf.com https://docs.jamf.com/customer-education/jamf-100-course/5.0/Lesson_9_macOS_File_Storage_Structure.html
doubleoctopus.com https://doubleoctopus.com/security-wiki/threats-and-tools/wi-fi-eavesdropping/
dualog.com https://www.dualog.com/blog/what-are-command-and-control-c2-callbacks
dynamics.microsoft.com https://dynamics.microsoft.com/en-us/erp/what-is-erp/
easytechjunkie.com https://www.easytechjunkie.com/what-is-a-virtual-crime-scene.htm
edrm.net https://edrm.net/resources/frameworks-and-standards/edrm-model/identification/
education.vic.gov.au https://www.education.vic.gov.au/Documents/about/programs/bullystoppers/smgrooming.pdf
educative.io https://www.educative.io/answers/what-are-iot-attacks
encyclopedia.kaspersky.com https://encyclopedia.kaspersky.com/glossary/deface/
esafety.gov.au https://www.esafety.gov.au/
eurojust.europa.eu https://www.eurojust.europa.eu/annual-report-2021/securing-evidence/tackling-cybercrime-as-service
exterro.com https://www.exterro.com/
extrahop.com https://www.extrahop.com/resources/attacks/cryptomining/
faa.gov https://www.faa.gov/faq/what-unmanned-aircraft-system-uas
fbi.gov https://www.fbi.gov/investigate/terrorism
fcc.gov https://www.fcc.gov/scam-glossary
fema.gov https://www.fema.gov/authorized-equipment-list-item/03oe-07-suas
fileinfo.com https://fileinfo.com/extension/catalog
fletc.gov https://www.fletc.gov/jtag-chipoff-smartphones-training-program
forensicmag.com https://www.forensicmag.com/3425-Featured-Article-List/583590-Isolating-Devices-to-Preserve-Evidence/
forensicsdigest.com https://forensicsdigest.com/mac-os-file-system/
fortinet.com https://www.fortinet.com/resources/cyberglossary/
fraud.net https://fraud.net/d/
ftc.gov https://www.ftc.gov/
gartner.com https://www.gartner.com/en/information-technology/glossary/
geeksforgeeks.org https://www.geeksforgeeks.org/understanding-rainbow-table-attack/
gemini.com https://www.gemini.com/cryptopedia/crypto-cold-storage-brain-wallets
gibsondunn.com https://www.gibsondunn.com/e-discovery-basics-production-of-esi-vol-1-no-9/
github.com https://github.com/volatilityfoundation/volatility
gkm2.com.au https://gkm2.com.au/juice-jacking-attack/
gov.uk https://www.gov.uk/government/publications/hmrc-issue-briefing-hmrcs-approach-to-tax-fraud/hmrcs-approach-to-tax-fraud
gps.gov https://www.gps.gov/systems/
hashcat.net https://hashcat.net/hashcat/
headjam.com.au https://www.headjam.com.au/knowledge-base/answer/what-is-the-difference-between-uploading-and-downloading
home.treasury.gov https://home.treasury.gov/policy-issues/terrorism-and-illicit-finance/money-laundering
iacc.org https://www.iacc.org/resources/about/what-is-counterfeiting
IACP Law Enforcement Cyber Center https://www.iacpcybercenter.org/resources-2/glossary/
ibm.com https://www.ibm.com/topics/
icann.org https://www.icann.org/en/blogs/details/the-dark-web-the-land-of-hidden-services-27-6-2017-en
identiv.com https://www.identiv.com/resources/blog/what-are-rfid-tags-and-how-are-they-used
igi-global.com https://www.igi-global.com/dictionary/quality-service-mobile-hoc-networks/30805
imo.org https://www.imo.org/en/OurWork/Safety/Pages/LRIT.aspx
infoguardsecurity.com https://www.infoguardsecurity.com/what-is-scam-and-types-of-scam/
infosecawareness.in https://infosecawareness.in/concept/children/online-predators
infosecwriteups.com https://infosecwriteups.com/dll-injection-dllinjector-d1b30c6760eb
internetsafetystatistics.com https://www.internetsafetystatistics.com/what-is-cyber-fraud/
interpol.int https://www.interpol.int/content/download/16243/file/Guidelines_to_Digital_Forensics_First_Responders_V7.pdf
investor.gov https://www.investor.gov/protect-your-investments/fraud/types-fraud/
isaca.org https://www.isaca.org/resources/news-and-trends/industry-news/2018/combatting-fileless-malware
it.nc.gov https://it.nc.gov/documents/cybersecurity-newsletters/2019/esrmo-newsletter-september-2019/download?attachment
itgovernance.co.uk https://www.itgovernance.co.uk/blog/what-is-the-iso-27000-series-of-standards
javatpoint.com https://www.javatpoint.com/what-is-recycle-bin
jdsupra.com https://www.jdsupra.com/legalnews/preservation-of-evidence-methods-and-9317866/
jetico.com https://www.jetico.com/data-encryption
judicature.duke.edu https://judicature.duke.edu/articles/data-visualization-what-is-it-and-can-you-trust-it/
justice.gov https://www.justice.gov/
kaspersky.com https://www.kaspersky.com/resource-center/definitions/
law.cornell.edu https://www.law.cornell.edu/
lawinsider.com https://www.lawinsider.com/dictionary/
learn.microsoft.com https://learn.microsoft.com/en-us/
learnvern.com https://www.learnvern.com/cyber-forensics-course/disk-partition
legaldictionary.net https://legaldictionary.net/
legal-dictionary.thefreedictionary.com https://legal-dictionary.thefreedictionary.com/espionage
legalmatch.com https://www.legalmatch.com/law-library/article/what-is-contract-fraud.html
lindahall.org https://www.lindahall.org/experience/digital-exhibitions/connecting-the-dots/03-trace
link.springer.com https://link.springer.com/referenceworkentry/10.1007/978-0-387-39940-9_417
magnetforensics.com https://www.magnetforensics.com/products/magnet-axiom-cyber/
makeuseof.com https://www.makeuseof.com/what-is-wiper-malware/
manageengine.com https://www.manageengine.com/vulnerability-management/misconfiguration/
mass.gov https://www.mass.gov/info-details/
mcafee.com https://www.mcafee.com/learn/what-is-gps-spoofing/
mckinsey.com https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-the-internet-of-things
michigan.gov https://www.michigan.gov/difs/consumers/fraud/what-is-insurance-fraud
mobileforensicsolutions.tech https://mobileforensicsolutions.tech/chip-off-examinations/
mtu.edu https://www.mtu.edu/it/security/information-security-plan/4-definitions/
mylawquestions.com https://www.mylawquestions.com/what-is-evidence-analysis.htm
nacdl.org https://www.nacdl.org/getattachment/e30285fa-61eb-4b71-9bdb-6458b7140dc9/common-digital-forensics-terms-acronyms-and-certifications-1-.pdf
nafo.int https://www.nafo.int/Fisheries/ReportingRequirements/VMS
netresec.com https://www.netresec.com/?page=NetworkMiner
niccs.cisa.gov https://niccs.cisa.gov/
nist.gov https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/glossary
nnlm.gov https://www.nnlm.gov/guides/data-glossary/web-scraping
norfolk.police.uk https://www.norfolk.police.uk/advice/cybercrime/1-what-cybercrime
ojp.gov https://www.ojp.gov/pdffiles1/nij/254661.pdf
opensource.com https://opensource.com/article/17/5/introduction-ext4-filesystem
opentext.com https://www.opentext.com/products/encase-forensic
osforensics.com https://www.osforensics.com/
owasp.org https://owasp.org/
oxygenforensics.com https://oxygenforensics.com/en/products/oxygen-forensic-detective/
pages.nist.gov https://pages.nist.gov/mobile-threat-catalogue/lan-pan-threats/LPN-0.html
patents.google.com https://patents.google.com/patent/CA2603315C/sv
pcmag.com https://www.pcmag.com/encyclopedia/term
percipient.co https://percipient.co/overview-the-three-types-of-forensic-collections-physical-vs-logical-vs-targeted/
podcastle.ai https://podcastle.ai/blog/what-is-voice-cloning/
police.qld.gov.au https://www.police.qld.gov.au/safety-and-preventing-crime/r-u-in-control/internet-auction-fraud
police1.com https://www.police1.com/chiefs-sheriffs/articles/16-features-to-look-for-in-a-digital-evidence-management-system-dems-34OPR6vui29EJx2z/
portal.311.nyc.gov https://portal.311.nyc.gov/article/?kanumber=KA-01611
portswigger.net https://portswigger.net/web-security/file-upload
precisely.com https://www.precisely.com/glossary/deduplication
privacysense.net https://www.privacysense.net/terms/shoulder-surfing/
professormesser.com https://www.professormesser.com/security-plus/sy0-401/christmas-tree-attack-2/
proofpoint.com https://www.proofpoint.com/us/threat-reference/
radiotimes.com https://www.radiotimes.com/technology/what-is-a-smart-speaker/
recoverit.wondershare.com https://recoverit.wondershare.com/partition-tips/what-is-partition-table.html
reportandsupport.durham.ac.uk https://reportandsupport.durham.ac.uk/support/what-is-online-harassment
safeguardingchildren.co.uk https://www.safeguardingchildren.co.uk/parents-carers/child-exploitation/
saferderbyshire.gov.uk https://www.saferderbyshire.gov.uk/site-elements/documents/pdf/glossary-of-cyber-security-terms.pdf
sans.org https://www.sans.org/blog/what-is-open-source-intelligence/
scamwatch.gov.au https://www.scamwatch.gov.au/types-of-scams/investments/investment-scams
sciencedirect.com https://www.sciencedirect.com/topics/computer-science/cyberstalking
sciencedirect.com https://www.sciencedirect.com/science/article/
searchandseizure.org http://www.searchandseizure.org/consentsearches.html
securityboulevard.com https://securityboulevard.com/2022/07/7-common-internet-of-things-iot-attacks-that-compromise-security/
securitybrief.com.au https://securitybrief.com.au/story/hackers-increasingly-island-hopping-so-what-does-it-mean
seon.io https://seon.io/resources/
simplitfy.com https://www.simplitfy.com/news-sms-spoofing-what-is-it-and-how-can-you-avoid-sms-spoofing-fraud.html
skybrary.aero https://skybrary.aero/articles/introduction-remotely-piloted-aircraft-systems-rpas
sleuthkit.org https://www.sleuthkit.org/
solvusoft.com https://www.solvusoft.com/en/file-extensions/software/symantec-corporation/pgp-desktop/
sproutsocial.com https://sproutsocial.com/glossary/url-shortener/
sqasolar.org.uk https://www.sqasolar.org.uk/solar/material/IS01CGCD/page_03.htm
state.gov https://www.state.gov/darkside-ransomware-as-a-service-raas/
support.apple.com https://support.apple.com/
support.kaspersky.com https://support.kaspersky.com/KESWin/11.4.0/en-US/174954.htm
systemweakness.com https://systemweakness.com/hacking-wireless-networks-around-the-globe-practical-wifi-hacking-f8bdc36536b8
tech-faq.com https://www.tech-faq.com/truecrypt.html
techopedia.com https://www.techopedia.com/definition/
techtarget.com https://www.techtarget.com/whatis/definition/
techterms.com https://techterms.com/definition/puk_code
techwalla.com https://www.techwalla.com/articles/what-is-website-cloning
texasattorneygeneral.gov https://www.texasattorneygeneral.gov/consumer-protection/health-care/health-care-fraud-and-abuse
thecyberwire.com https://thecyberwire.com/glossary/
theiacp.org https://www.theiacp.org/sites/default/files/2018-07/RadicalizationtoViolentExtremismAwarenessBrief.pdf
thetechedvocate.org https://www.thetechedvocate.org/what-are-prefetch-files-in-windows-are-they-important/
theverge.com https://www.theverge.com/2023/1/26/23572604/watermark-removal-stock-images-shutterstock-getty-adobe
transparency.org https://www.transparency.org/en/corruptionary/tax-evasion
trellix.com https://www.trellix.com/en-us/security-awareness/operations/what-is-cyber-threat-hunting.html
trendmicro.com https://www.trendmicro.com/vinfo/us/security/definition/
trial.laws.com https://trial.laws.com/evidence/evidence-bag
trustedcomputinggroup.org https://trustedcomputinggroup.org/resource/trusted-platform-module-tpm-summary/
unodc.org https://www.unodc.org/e4j/zh/cybercrime/module-14/key-issues/cyberterrorism.html
us.norton.com https://us.norton.com/blog
vacourts.gov https://www.vacourts.gov/courts/overview/glossary_of_court_terms.html
veracrypt.fr https://www.veracrypt.fr/en/Home.html
verizon.com https://www.verizon.com/about/blog/isp-meaning
visa.com.au https://www.visa.com.au/content/dam/VCOM/download/merchants/Visa_Security_Alert_070114.pdf
wallstreetmojo.com https://www.wallstreetmojo.com/carding/
wipo.int https://www.wipo.int/about-ip/en/
wireshark.org https://www.wireshark.org/about.html
withpersona.com https://withpersona.com/blog/cryptocurrency-theft-statistics
www2.deloitte.com https://www2.deloitte.com/content/dam/Deloitte/xe/Documents/About-Deloitte/mepovdocuments/mepov13/dtme_mepov13_Procurement%20fraud.pdf
x-ways.net https://www.x-ways.net/winhex/forensics.html
ynvisible.com https://www.ynvisible.com/news-inspiration/what-is-smart-card
zylab.com https://www.zylab.com/en/blog/five-best-practices-for-digital-evidence-collection-and-preservation-for-internal-investigations-and-ediscovery
ensics.com https://www.504ensics.com/tools/spotlight-inspector-digital-forensics-app-for-mac-osx