loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  4  5  6  7  8  9  10  ...  52  (Next)
  ALL

6

6LoWPAN

6LoWPAN is a communication protocol that enables low-power devices to communicate wirelessly over IPv6 networks. It is commonly used in IoT applications, allowing sensors and other low-power devices to connect to the internet in IIoT and ICS environments.

A

Access Control List (ACL)

A list of permissions attached to a file or resource that specifies which users or groups can read, write, execute, or modify the object.

Account Takeover (ATO)

Unauthorized access and control of an online account, often through stolen credentials, phishing, SIM swapping, or malware. Investigations may focus on login IPs, device fingerprints, password reset events, MFA changes, and victim/provider communications.

Address

A public alphanumeric identifier used to receive cryptocurrency; comparable to an account number on a blockchain.

Address Clustering

Analytic technique that groups wallet addresses likely controlled by the same entity using transaction behavior heuristics.

Admissibility

The legal acceptability of evidence in court. Digital evidence admissibility depends on relevance, authenticity, integrity, proper collection, chain of custody, and compliance with rules of evidence and constitutional/statutory requirements.

Advanced Encryption Standard (AES)

AES is a widely adopted symmetric block cipher standard. It supports 128, 192, and 256-bit keys and is commonly used for disk encryption, VPNs, encrypted messaging, and secure storage.

AEAD (Authenticated Encryption with Associated Data)

AEAD is an authenticated encryption approach that encrypts a message while also authenticating additional unencrypted data (such as headers). AEAD is used heavily in network protocols like TLS, where some fields must remain visible but still integrity-protected.

AES-GCM

AES-GCM (Galois/Counter Mode) is a widely used AEAD mode providing confidentiality and integrity. It is fast and common in TLS and VPNs, but requires strict nonce uniqueness for safety.

Affidavit

A written statement of facts made voluntarily under oath or affirmation. In digital investigations, affidavits commonly support search warrants by explaining probable cause, describing the digital evidence sought (devices, accounts, cloud data), and outlining the methods used to identify and preserve it.


Page:  1  2  3  4  5  6  7  8  9  10  ...  52  (Next)
  ALL