13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1<br />

Glossary<br />

ABSOLUTE<br />

AeNB<br />

BIoT<br />

binary<br />

C2<br />

CCIR<br />

CD<br />

CELLEX<br />

CPU<br />

COP<br />

computer<br />

forensics<br />

data<br />

DF<br />

DFA<br />

digital<br />

evidence<br />

DMA<br />

dongle<br />

DTN<br />

DVD<br />

evBO<br />

FP<br />

FOB<br />

GUI<br />

hardware<br />

HDD<br />

HID<br />

ICC<br />

information<br />

information<br />

assurance<br />

information<br />

operations (IO)<br />

Internet<br />

Intsum<br />

IP<br />

IT<br />

ITTI<br />

Laptop<br />

Aerial Base Station with Opportunistic Links for Unattended and Temporary Events<br />

Aerial eNodeB, used in ABSOLUTE<br />

Battlefield Internet of Things. The set of IT devices, the information processed and the<br />

opposing force making use of them in the battlefield<br />

Technique for representing data as a series of 1s and 0s<br />

Command and Control<br />

Commander’s critical information requirement<br />

Compact Disk<br />

Cell-phone exploitation<br />

Central Processing Unit. Portion of the computer where high-speed computations occur<br />

Common Operational Picture. A single identical display of relevant information shared by<br />

more than one command<br />

Application of computer investigation and analysis techniques to determine potential legal<br />

evidence (or intelligence)<br />

Representation of facts that can be used for processing and creating information for decisionmaking<br />

Digital forensics<br />

Digital forensics asset<br />

Information that is stored or transmitted in electronic format using the binary numbering<br />

system<br />

Direct memory access<br />

A device that plugs into an available computer port (USB) and performs a useful service such<br />

as encryption, infrared data transfer, or network connectivity)<br />

Delay-tolerant networking<br />

Digital versatile disk (or digital video disk)<br />

Evidence-based operations<br />

Force protection<br />

Forward Operating Base. In special operations, a base usually located in friendly territory or<br />

afloat that is established to extend command and control.<br />

Graphical user interface<br />

Any object or component that can be associated with a computer system<br />

Hard disk drive<br />

Human interface device, commonly refers to USB HID class devices (keyboards, mice, or game<br />

controllers)<br />

International Criminal Court<br />

Processed data<br />

Methods and techniques used to assure the confidentiality, legacy, integrity and<br />

nonrepudiation of information<br />

Integrated employment of the core capabilities of electronic warfare, computer network<br />

operations, psychological, deception, and operations security.<br />

Network(s) that connects millions of computers across the globe using internationally<br />

accepted protocols<br />

Intelligence summary<br />

Internet protocol. The standard that works with the transmission control protocol (TCP)—<br />

that is, describes how an internet-connected computer should break data down into packets<br />

for transmission across the network, and how these packets should be addressed so that they<br />

arrive at their destination.<br />

Information technology<br />

(IT)Target Infrastructure (ITTI)<br />

A portable computer.<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!