loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  (Next)
  ALL

O

OCSP (Online Certificate Status Protocol)

OCSP is a protocol used to check the revocation status of a certificate in near real time. OCSP can reduce the need to download large CRLs, but also introduces privacy and availability considerations.

OFAC

U.S. Office of Foreign Assets Control; administers sanctions programs relevant to crypto compliance and exposure screening.

Off‑Chain

Data or events occurring outside the blockchain ledger (e.g., exchange logs, chats, email, IP records).

On‑Chain

Data or events recorded directly on the blockchain ledger.

One-Time Pad (OTP)

A theoretically perfect encryption method that uses a truly random key the same length as the plaintext, used only once. While information-theoretically secure, OTP is impractical at scale due to key generation, distribution, and management requirements.

OPC (OLE for Process Control)

OPC (OLE for Process Control) is an industrial communication standard that allows different control systems and devices to communicate by providing a common interface, facilitating interoperability between various hardware and software in ICS environments.

OPC UA (Unified Architecture)

OPC UA is a platform-independent industrial communication protocol used for secure and reliable data exchange in ICS and IIoT environments. It is an evolution of the OPC standard, supporting complex data models and enhanced security features.

Open-Source Intelligence (OSINT)

Information collected from publicly available sources such as websites, social media, public records, forums, and leaked datasets. OSINT can generate leads and context but must be validated; investigators document sources, capture methods, and time of collection.

Operating System (OS)

An Operating System is system software that manages computer hardware, memory, storage, processes, and user interaction. It provides services to applications and enforces security, access control, and resource allocation.

Operational Security (OPSEC)

Practices used to protect investigative methods, identities, and sensitive information from exposure. In digital investigations, OPSEC includes safe browsing, identity separation, avoiding metadata leakage, using controlled systems, and documenting protective measures for undercover work.


Page:  1  2  (Next)
  ALL