Abbreviations

AIS Automatic Identification System

ATM automated teller machine

BYOD bring-your-own-device

BYOC bring-your-own-cloud

BYOX bring-your-own-everything

CaaS Crime-as-a-Service

CAM child abuse material

C&C command and control

CERT computer emergency response team

CNP card-not-present

CSE child sexual exploitation

CSECO commercial sexual exploitation of children online

CSEO child sexual exploitation online

DDoS Distributed Denial of Service

DHCP Dynamic Host Configuration Protocol

DNS Domain Name System

DoS Denial of Service

EC3 European Cybercrime Centre

ECI European Critical Infrastructure

EMPACT European Multidisciplinary Platform Against Criminal Threats

EMV Europay, MasterCard and Visa

EU European Union

FP Focal Point

GPS global positioning system

I2P Invisible Internet Project

IaaS Infrastructure-as-a-Service

ICS Industrial Control System

ICT information and communications technology

iOCTA Internet Organised Crime Threat Assessment

IoE Internet of Everything

IoT Internet of Things

IP Internet protocol

IPv Internet Protocol version

ISP Internet service provider

J-CAT Joint Cybercrime Action Taskforce

LE law enforcement

M2M machine to machine

MaaS Malware-as-a-Service

MLAT Mutual Legal Assistance Treaty

MS Member State(s)

NIST National Institute of Standards and Technology

OCG organised crime group

OSINT open-source intelligence

P2M people to machine

P2P peer to peer, or people to people

PaaS Platform-as-a-Service

PCF payment card fraud

PGP Pretty Good Privacy

PIN personal identification number

PoS point-of-sale

RAT Remote Access Tool

SaaS Software-as-a-Service

SCADA Supervisory Control and Data Acquisition

SEPA Single Euro Payments Area

SMS short message service

SPOC Single Points of Contact

TCP Transmission Control Protocol

TCSO travelling child sex offender

TOR The Onion Router

URL uniform resource locator

USB universal serial bus

VoIP Voice-over-Internet Protocol

VPN virtual private network