273 lines
6.1 KiB
Markdown
273 lines
6.1 KiB
Markdown
|
|
# SMOA Terminology Glossary
|
||
|
|
|
||
|
|
**Version:** 1.0
|
||
|
|
**Last Updated:** 2024
|
||
|
|
**Status:** Active
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Purpose
|
||
|
|
|
||
|
|
This glossary defines standard terms, acronyms, and abbreviations used throughout SMOA documentation to ensure consistent terminology.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Application Terms
|
||
|
|
|
||
|
|
### SMOA
|
||
|
|
**Secure Mobile Operations Application** - The Android-based application for secure mobile operations on foldable devices.
|
||
|
|
|
||
|
|
### Module
|
||
|
|
A self-contained functional component of SMOA. Modules are organized into:
|
||
|
|
- **Core Modules:** Foundational modules (auth, security, common, etc.)
|
||
|
|
- **Feature Modules:** Functional modules (credentials, orders, evidence, etc.)
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Authentication and Security Terms
|
||
|
|
|
||
|
|
### MFA
|
||
|
|
**Multi-Factor Authentication** - Authentication requiring multiple factors (knowledge, possession, inherence).
|
||
|
|
|
||
|
|
### RBAC
|
||
|
|
**Role-Based Access Control** - Access control method based on user roles.
|
||
|
|
|
||
|
|
### PIN
|
||
|
|
**Personal Identification Number** - Numeric access code for authentication.
|
||
|
|
|
||
|
|
### Biometric
|
||
|
|
Biological characteristics used for authentication (fingerprint, facial recognition).
|
||
|
|
|
||
|
|
### Hardware-Backed
|
||
|
|
Cryptographic operations performed in secure hardware (Trusted Execution Environment).
|
||
|
|
|
||
|
|
### TEE
|
||
|
|
**Trusted Execution Environment** - Secure area of processor for secure operations.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Compliance and Standards Terms
|
||
|
|
|
||
|
|
### eIDAS
|
||
|
|
**Electronic Identification, Authentication and Trust Services** - EU regulation for electronic identification and trust services.
|
||
|
|
|
||
|
|
### QES
|
||
|
|
**Qualified Electronic Signature** - Electronic signature with qualified certificate per eIDAS.
|
||
|
|
|
||
|
|
### QTSP
|
||
|
|
**Qualified Trust Service Provider** - Trust service provider qualified under eIDAS.
|
||
|
|
|
||
|
|
### AS4
|
||
|
|
**Applicability Statement 4** - OASIS standard for secure web service messaging.
|
||
|
|
|
||
|
|
### PDF417
|
||
|
|
Two-dimensional barcode format (ISO/IEC 15438).
|
||
|
|
|
||
|
|
### AAMVA
|
||
|
|
**American Association of Motor Vehicle Administrators** - Organization setting driver license standards.
|
||
|
|
|
||
|
|
### ICAO
|
||
|
|
**International Civil Aviation Organization** - UN agency setting travel document standards.
|
||
|
|
|
||
|
|
### MIL-STD
|
||
|
|
**Military Standard** - U.S. Department of Defense standards.
|
||
|
|
|
||
|
|
### ISO
|
||
|
|
**International Organization for Standardization** - International standards organization.
|
||
|
|
|
||
|
|
### NIST
|
||
|
|
**National Institute of Standards and Technology** - U.S. standards organization.
|
||
|
|
|
||
|
|
### CJIS
|
||
|
|
**Criminal Justice Information Services** - FBI division managing criminal justice information.
|
||
|
|
|
||
|
|
### NCIC
|
||
|
|
**National Crime Information Center** - FBI database for criminal justice information.
|
||
|
|
|
||
|
|
### III
|
||
|
|
**Interstate Identification Index** - FBI database for criminal history information.
|
||
|
|
|
||
|
|
### ATF
|
||
|
|
**Bureau of Alcohol, Tobacco, Firearms and Explosives** - U.S. federal law enforcement agency.
|
||
|
|
|
||
|
|
### ORI
|
||
|
|
**Originating Agency Identifier** - Unique identifier for law enforcement agencies.
|
||
|
|
|
||
|
|
### UCN
|
||
|
|
**Unique Control Number** - Unique identifier for NCIC transactions.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Technical Terms
|
||
|
|
|
||
|
|
### API
|
||
|
|
**Application Programming Interface** - Interface for software components to communicate.
|
||
|
|
|
||
|
|
### REST
|
||
|
|
**Representational State Transfer** - Architectural style for web services.
|
||
|
|
|
||
|
|
### SOAP
|
||
|
|
**Simple Object Access Protocol** - Protocol for exchanging structured information.
|
||
|
|
|
||
|
|
### XML
|
||
|
|
**eXtensible Markup Language** - Markup language for encoding documents.
|
||
|
|
|
||
|
|
### JSON
|
||
|
|
**JavaScript Object Notation** - Data interchange format.
|
||
|
|
|
||
|
|
### PDF
|
||
|
|
**Portable Document Format** - Document format.
|
||
|
|
|
||
|
|
### CSV
|
||
|
|
**Comma-Separated Values** - Data format.
|
||
|
|
|
||
|
|
### TLS
|
||
|
|
**Transport Layer Security** - Cryptographic protocol for secure communication.
|
||
|
|
|
||
|
|
### VPN
|
||
|
|
**Virtual Private Network** - Secure network connection.
|
||
|
|
|
||
|
|
### MDM
|
||
|
|
**Mobile Device Management** - Management of mobile devices.
|
||
|
|
|
||
|
|
### UEM
|
||
|
|
**Unified Endpoint Management** - Management of all endpoints.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Data and Database Terms
|
||
|
|
|
||
|
|
### At Rest
|
||
|
|
Data stored on disk or storage media.
|
||
|
|
|
||
|
|
### In Transit
|
||
|
|
Data being transmitted over a network.
|
||
|
|
|
||
|
|
### Encryption
|
||
|
|
Process of encoding data to prevent unauthorized access.
|
||
|
|
|
||
|
|
### Decryption
|
||
|
|
Process of decoding encrypted data.
|
||
|
|
|
||
|
|
### Key Management
|
||
|
|
Process of managing cryptographic keys.
|
||
|
|
|
||
|
|
### Certificate
|
||
|
|
Digital certificate for authentication and encryption.
|
||
|
|
|
||
|
|
### OCSP
|
||
|
|
**Online Certificate Status Protocol** - Protocol for checking certificate revocation.
|
||
|
|
|
||
|
|
### CRL
|
||
|
|
**Certificate Revocation List** - List of revoked certificates.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Operational Terms
|
||
|
|
|
||
|
|
### Online
|
||
|
|
Connected to network with full functionality.
|
||
|
|
|
||
|
|
### Offline
|
||
|
|
Disconnected from network with limited functionality.
|
||
|
|
|
||
|
|
### Degraded
|
||
|
|
Partially connected with reduced functionality.
|
||
|
|
|
||
|
|
### Fold State
|
||
|
|
Physical state of foldable device (folded/unfolded).
|
||
|
|
|
||
|
|
### Session
|
||
|
|
User's active interaction period with application.
|
||
|
|
|
||
|
|
### Lockout
|
||
|
|
Temporary or permanent access restriction.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Module-Specific Terms
|
||
|
|
|
||
|
|
### Credential
|
||
|
|
Digital representation of identity or authorization document.
|
||
|
|
|
||
|
|
### Order
|
||
|
|
Digital authorization or directive (search warrant, arrest warrant, etc.).
|
||
|
|
|
||
|
|
### Evidence
|
||
|
|
Physical or digital evidence in legal or investigative context.
|
||
|
|
|
||
|
|
### Chain of Custody
|
||
|
|
Documented history of evidence handling.
|
||
|
|
|
||
|
|
### Report
|
||
|
|
Formatted output document (PDF, XML, JSON, CSV).
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Status Indicators
|
||
|
|
|
||
|
|
### ✅ Complete
|
||
|
|
Fully implemented and functional.
|
||
|
|
|
||
|
|
### ⚠️ Partial
|
||
|
|
Partially implemented with gaps.
|
||
|
|
|
||
|
|
### ❌ Non-Compliant / Not Started
|
||
|
|
Not implemented or major gaps.
|
||
|
|
|
||
|
|
### 🔄 In Progress
|
||
|
|
Currently being implemented.
|
||
|
|
|
||
|
|
### N/A
|
||
|
|
Not applicable.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Priority Levels
|
||
|
|
|
||
|
|
### P1
|
||
|
|
**Priority 1** - Critical, blocking operational use.
|
||
|
|
|
||
|
|
### P2
|
||
|
|
**Priority 2** - High priority, enhances operational capability.
|
||
|
|
|
||
|
|
### P3
|
||
|
|
**Priority 3** - Medium priority, future enhancement.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Document Status
|
||
|
|
|
||
|
|
### Draft
|
||
|
|
Initial version, not yet reviewed.
|
||
|
|
|
||
|
|
### In Review
|
||
|
|
Under review by subject matter experts.
|
||
|
|
|
||
|
|
### Approved
|
||
|
|
Reviewed and approved for publication.
|
||
|
|
|
||
|
|
### Published
|
||
|
|
Available to target audience.
|
||
|
|
|
||
|
|
### Archived
|
||
|
|
Retired or superseded version.
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
## Additions and Updates
|
||
|
|
|
||
|
|
This glossary should be updated as new terms are introduced. When adding terms:
|
||
|
|
1. Add term in alphabetical order
|
||
|
|
2. Provide full form for acronyms
|
||
|
|
3. Provide clear definition
|
||
|
|
4. Include context if helpful
|
||
|
|
5. Update version number and date
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
**Document Owner:** Documentation Lead
|
||
|
|
**Last Updated:** 2024
|
||
|
|
**Next Review:** Quarterly
|
||
|
|
|