Home
Add Document
Sign In
Create An Account
Computer Forensics p. 1 What is computer forensics? p. 1 Why is computer forensics of vital interest to you? p. 1 As an employee p
Introduction p. xv Computer Forensics p. 1 What is computer forensics? p. 1 Why is computer forensics of vital interest to you? p. 1 As an emp...
Author:
Shawn Floyd
0 downloads
2 Views
13KB Size
Report
Download PDF
Recommend Documents
What is Computer Forensics?
Computer Security & Forensics Forensics Practical Two : Volatility!
2015. Overview. Introduction to Veterinary Forensics (Overview) What is Veterinary Forensics? What is Veterinary Forensics?
W MP P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1
Software security, secure programming (and computer forensics)
Forensics
P (X = 0) = 1 p and P (X = 1) = p
P A Inamdar Computer Center, Azam Campus Category 1
Open Source Tools for 3D Forensic Reconstructions Part 1 Eugene Liscio, P. Eng. AI2-3D Forensics
p c p c p c c p p c h 1 h 2 h n c? 1. p c 2. (p c) is a tautology. Direct 3. ( p c) is a tautology. Direct 4. ( c p)is a tautology
1 D-A P P
p k (1 p) n k s k = (1 p + ps) n. k p(1 p) k 1 s k ((1 p)s) k 1 =
MAC OS X FORENSICS: PASSWORD DISCOVERY 1
Introduction to Forensics
What is Computer Vision? Introduction. What do you see? Why is this hard? What was happening. Why study Computer Vision?
P - 1 -
Introduction to Drosophila Techniques & P 1 x P 1 Matings
P.1 P.2 P.3 P.3 P.4 P.6 P.7 P.8 P.9 P.11
Master of Advanced Studies in Forensics (MAS Forensics)
Benutzerhandbuch. Personal Computer Serie VGN-P
What Is Multimedia Made Of? Multimedia Components p. 1 Overview p. 1 Introduction p. 2 Communicating Ideas p. 2 Elements of a Multimedia Application
What is Computer Science?
FORENSICS & SECURITY
Forensics Architecture
Introduction
p. xv
Computer Forensics
p. 1
What is computer forensics?
p. 1
Why is computer forensics of vital interest to you?
p. 1
As an employee
p. 1
As an employer or corporate executive
p. 2
As a law enforcement official
p. 3
As an individual
p. 4
As a lawyer for the defense
p. 5
As an insurance company
p. 6
As a user of others' computers
p. 6
If you have done nothing illegal, you have nothing to fear: not true anywhere!
p. 6
Computer forensics
p. 8
User rights to privacy?
p. 8
The forensics investigator must know up front
p. 9
Forensics is deceptively simple but requires vast expertise
p. 9
Computer forensics top-level procedure
p. 11
Forensics specifics
p. 13
Digital evidence is often evidence of nothing
p. 16
Selected bibliography
p. 22
Locating Your Sensitive Data in Your Computer
p. 23
Deleting does not delete--what does?
p. 23
General
p. 23
Disk wiping
p. 26
File- and disk-wiping software
p. 28
Magnetic microscopy forensic examination of disks
p. 31
Where is the sensitive data hiding?
p. 32
Cluster tips or slack
p. 32
Free space
p. 33
The swap file
p. 34
Spool and temporary files
p. 34
Forensics on nonmagnetic disks
p. 35
History files
p. 35
Data in the registry files
p. 35
Data from sloppy use of personal encryption software
p. 36
Nonvolatile memory
p. 36
The swap file as a source of forensic data
p. 36
General
p. 36
Securely wiping the swap file
p. 38
The Registry as a source of forensic data
p. 39
Why is the Registry a major source of forensic evidence?
p. 39
Where is all this private information hiding in the Registry?
p. 41
Backing up the Registry and restoring a corrupted one
p. 42
Cleaning up sensitive data in the Registry
p. 42
Reference
p. 44
Specialized Forensics Applications
p. 45
Digital watermarking
p. 45
The British RIP Act and the US Carnivore (DCS1000)
p. 49
Selected bibliography
p. 51
How Can Sensitive Data Be Stolen from One's Computer?
p. 53
Physical possession of one's computer
p. 53
Temporary physical access to one's computer
p. 53
Commercial hardware keystroke loggers
p. 54
Commercial software keystroke loggers
p. 57
Going online
p. 58
By one's ISP or by anyone having compromised the ISP's security
p. 58
By a legal or an illegal telephone tap
p. 59
By remote Web sites that one accesses
p. 59
Spyware in your computer
p. 60
By commercial spyware and adware
p. 60
van Eck radiation using commercially available systems
p. 64
General
p. 64
Protective measures
p. 65
Optical emanations and their interception
p. 69
Being on a network, cable modem, or xDSL modem
p. 69
Other means
p. 70
Insertion of incriminating data in your computer by others
p. 70
Security protection steps that don't work well enough
p. 71
The fallacy of CMOS password protection
p. 71
The fallacy of password protection offered by popular commercial software
p. 71
The fallacy of protection by hiding files from view
p. 72
The fallacy of protection by hiding data in the slack
p. 72
The fallacy of protection by placing data in normally unused locations of a disk
p. 72
The fallacy of protecting data by repartitioning a disk for a smaller capacity than the disk really has
p. 72
The fallacy of protection through password-protected disk access
p. 73
The fallacy of protection through the use of booby-trap software
p. 73
The fallacy that overwriting a file removes all traces of its existence
p. 73
The fallacy of encryption protection
p. 74
Other protection fallacies that don't deliver
p. 74
Selected bibliography
p. 75
References
p. 76
Why Computer Privacy and Anonymity?
p. 77
Anonymity
p. 79
Practical anonymity
p. 81
Privacy
p. 82
You cannot trust TRUSTe?
p. 82
Is privacy a right?
p. 83
The impact of technology on privacy
p. 86
Selected bibliography
p. 88
Practical Measures For Protecting Sensitive Information
p. 91
Installing secure Windows
p. 91
Recommended best practices
p. 91
If using Windows NT
p. 96
If using Windows 2000
p. 98
If using Windows XP
p. 102
Heroic protective measures regardless of the version of Windows
p. 104
Last but not least
p. 105
Additional privacy threats and countermeasures
p. 106
Individually serial-numbered documents
p. 106
Online activation and online snooping by software
p. 106
Microsoft documents that call home
p. 108
The NetBIOS and other threats from unneeded network services
p. 109
TCPA/Palladium
p. 109
The vulnerability of backups
p. 110
Protecting sensitive data on hard disks
p. 111
Full disk encryption
p. 112
Encrypting disk partitions
p. 114
Reference
p. 114
Basic Protection from Computer Data Theft Online
p. 115
Protection from which of many online threats?
p. 117
Installation of Windows for secure online operation
p. 117
Online security threats and issues
p. 118
Web browser hijacking
p. 118
The romantic e-card and related con schemes
p. 121
E-mail bombs
p. 121
Software to enhance online security
p. 122
Junkbuster
p. 122
SurfSecret
p. 122
Assorted cleaners of browsers
p. 122
Basic do's and don'ts
p. 124
Don't's
p. 124
Do's
p. 125
Practical Measures for Online Computer Activities
p. 127
Netscape Navigator/Communicator
p. 128
Microsoft Internet Explorer
p. 133
Desirable e-mail software configuration and modifications
p. 138
Free Web-based e-mail offers that require JavaScript: don't!
p. 138
Outlook and Outlook Express
p. 139
Eudora e-mail software
p. 139
Secure e-mail conduct online
p. 141
Self-protecting e-mail
p. 144
Accessing e-mail from anywhere on Earth
p. 148
E-mail forensics and traces: the anonymity that isn't
p. 149
Tracking suspect e-mail
p. 152
Sending anonymous e-mail: anonymous remailers
p. 154
General network tracing tools
p. 158
Advanced Protection from Computer Data Theft Online
p. 159
Virus/Trojan/worm protection
p. 159
Protection from keyloggers
p. 160
Protection from keystroke-capturing software
p. 160
Protection from keystroke-capturing hardware
p. 161
Protection from commercial adware/spyware
p. 161
Protection from Web bugs: an insidious and far-reaching threat
p. 163
Using encrypted connections for content protection
p. 164
Using proxy servers for anonymity
p. 167
Using encrypted connections to ISPs for content protection
p. 169
SSL
p. 170
SSH
p. 171
The failed promise of peer-to-peer clouds
p. 172
Caller ID traps to avoid
p. 173
Traps when connecting online from a cellular phone
p. 174
Traps when using FTP
p. 174
Using instant messaging schemes
p. 175
Pitfalls of online banking
p. 175
Secure Usenet usage
p. 176
Anonymity from other Usenet readers
p. 178
Anonymity from one's in-country ISP
p. 179
Usenet privacy in oppressive regimes
p. 180
Ports to protect from
p. 181
Sniffers
p. 184
Firewalls
p. 185
Personal software-based firewalls
p. 187
Software that calls home
p. 188
Reference
p. 189
Encryption
p. 191
Introduction
p. 191
Availability and use of encryption
p. 193
Old-fashioned encryption
p. 195
Conventional (symmetric) encryption
p. 195
Public-key encryption
p. 197
Elliptic-curve encryption
p. 200
Voice encryption online
p. 200
Attempts to control against encryption
p. 201
Legal issues
p. 202
Crypto laws around the world
p. 203
Can encryption bans work?
p. 204
Societal issues
p. 208
Technical issues
p. 209
Countermeasures
p. 210
State support for encryption
p. 211
The future of encryption
p. 212
Quantum cryptography
p. 213
Quantum computing
p. 214
DNA-based encryption
p. 215
Comments
p. 215
Selected bibliography
p. 216
References
p. 218
Practical Encryption
p. 219
Introduction
p. 219
Entire-disk encryption
p. 220
Encrypting for e-mail: PGP
p. 221
How PGP works
p. 224
Do's and don'ts of PGP installation and use
p. 226
The need for long public keys
p. 233
The man-in-the-middle problem
p. 234
DH or RSA?
p. 235
DSS?
p. 235
Selecting the Symmetric Encryption Algorithm
p. 236
A minor flaw in PGP
p. 236
PGP weaknesses
p. 238
Other uses of PGP
p. 239
Encrypting one's own files: encrypted disk partitions
p. 239
Steganography
p. 243
Practical considerations in steganography
p. 246
Detecting steganography: steganalysis
p. 246
Other ways that steganography can be detected
p. 247
Recommendations for maintaining privacy through steganography
p. 248
Password cracking
p. 249
File integrity authenticity: digital digests
p. 252
Emergencies
p. 253
Protecting sensitive data from a repressive regime
p. 253
A word of caution
p. 254
Getting discovered as a desirable persona
p. 254
Selected bibliography
p. 255
References
p. 256
Link Encryption: VPNs
p. 259
Split tunneling
p. 261
IPsec
p. 262
Summary
p. 263
Selected bibliography
p. 264
Security of Wireless Connectivity: Wi-Fi and Bluetooth
p. 265
Background
p. 265
The 802.11 technologies
p. 266
WEP insecurity
p. 268
War driving and war chalking
p. 270
Using Wi-Fi while traveling
p. 271
WPA
p. 272
Securing 802.11
p. 273
Bluetooth wireless link security issues
p. 274
Bluetooth security threats
p. 275
Recommended steps for enhancing security of Bluetooth devices
p. 277
Selected bibliography
p. 278
Other Computer-Related Threats to Privacy
p. 279
Commercial GPS devices
p. 279
RF ID devices
p. 281
Modern vehicles' black boxes
p. 283
Cell phones
p. 285
Prepaid calling cards
p. 286
Credit cards
p. 287
Intelligent mail
p. 288
Fax machines and telephone answering machines
p. 288
Office and home copiers
p. 289
Frequent-anything clubs
p. 289
Consumer electronics
p. 290
References
p. 290
Biometrics: Privacy Versus Nonrepudiation
p. 291
Are they effective? It depends
p. 291
Biometrics can be easily spoofed
p. 293
Identification is not synonymous with security
p. 298
Societal issues
p. 299
References
p. 300
Legal Issues
p. 301
Software agreements that shift the legal liability to the user
p. 301
Cyber-SLAPP suits
p. 303
E-mail
p. 303
Copyright
p. 305
U.S. Digital Millennium Copyright Act of 1998
p. 305
TheáUniform Computer Information Transactions Act
p. 308
Can one be forced to reveal a decryption key?
p. 309
Why is electronic evidence better than paper evidence?
p. 312
Civil legal discovery issues
p. 315
International policy on computer-related crime
p. 318
What is computer crime?
p. 319
What can a business do to protect itself?
p. 320
Criminal evidence collection issues
p. 320
Collection
p. 320
Handling
p. 321
Federal guidelines for searching and seizing computers
p. 321
Destruction of electronic evidence
p. 326
U.S.-European data-privacy disputes
p. 327
New international computer crime treaty
p. 327
The post-September 11 reality
p. 328
The sky is the limit--or is it the courts?
p. 331
References
p. 332
About the Author
p. 333
Index
p. 335
Table of Contents provided by Blackwell's Book Services and R.R. Bowker. Used with permission.
Suggest Documents
What is Computer Forensics?
Read more
Computer Security & Forensics Forensics Practical Two : Volatility!
Read more
2015. Overview. Introduction to Veterinary Forensics (Overview) What is Veterinary Forensics? What is Veterinary Forensics?
Read more
W MP P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1 P 1
Read more
Software security, secure programming (and computer forensics)
Read more
Forensics
Read more
P (X = 0) = 1 p and P (X = 1) = p
Read more
P A Inamdar Computer Center, Azam Campus Category 1
Read more
Open Source Tools for 3D Forensic Reconstructions Part 1 Eugene Liscio, P. Eng. AI2-3D Forensics
Read more
p c p c p c c p p c h 1 h 2 h n c? 1. p c 2. (p c) is a tautology. Direct 3. ( p c) is a tautology. Direct 4. ( c p)is a tautology
Read more
1 D-A P P
Read more
p k (1 p) n k s k = (1 p + ps) n. k p(1 p) k 1 s k ((1 p)s) k 1 =
Read more
MAC OS X FORENSICS: PASSWORD DISCOVERY 1
Read more
Introduction to Forensics
Read more
What is Computer Vision? Introduction. What do you see? Why is this hard? What was happening. Why study Computer Vision?
Read more
P - 1 -
Read more
Introduction to Drosophila Techniques & P 1 x P 1 Matings
Read more
P.1 P.2 P.3 P.3 P.4 P.6 P.7 P.8 P.9 P.11
Read more
Master of Advanced Studies in Forensics (MAS Forensics)
Read more
Benutzerhandbuch. Personal Computer Serie VGN-P
Read more
What Is Multimedia Made Of? Multimedia Components p. 1 Overview p. 1 Introduction p. 2 Communicating Ideas p. 2 Elements of a Multimedia Application
Read more
What is Computer Science?
Read more
FORENSICS & SECURITY
Read more
Forensics Architecture
Read more
×
Report "Computer Forensics p. 1 What is computer forensics? p. 1 Why is computer forensics of vital interest to you? p. 1 As an employee p"
Your name
Email
Reason
-Select Reason-
Pornographic
Defamatory
Illegal/Unlawful
Spam
Other Terms Of Service Violation
File a copyright complaint
Description
×
Sign In
Email
Password
Remember me
Forgot password?
Sign In
Login with Google
Login with Facebook