Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Types of Computer Forensics Technology
Figure 2.1: CFX-2000 schematic. (
©Copyright 2002, Associated Business Publications. All rights reserved
).
Chapter 4: Data Recovery
Figure 4.1: A back-up using a shared tape library.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.2: A serverless back-up system.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.3: A LAN-less back-up using remote tape server.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.4: A storage area network using serverless back-up.
(©Copyright 2002, StorNet. All rights reserved).
Chapter 7: Computer Image Verification and Authentication
Figure 7.1: Security warning screen.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.2: Client application security warning.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.3: Inspect the certificate and verify its validity.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.4: Authenticode—VeriSign® Digital IDs Process.
(©Copyright 2002. VeriSign. All rights reserved).
Chapter 19: Advanced Computer Forensics
Figure 19.1: In public-key encryption [top], Alice encrypts a message using Bob’s public key, and Bob decrypts it using his private key. This scheme allows encrypted files to be sent in the absence of a secure means to exchange keys, a major improvement over symmetric encryption. It’s still possible, though, for Alice to receive a public key (or a conventional symmetric key) that ostensibly came from Bob, but that, in fact, belongs to a third party claiming to be Bob—the so-called man-in-the-middle attack (bottom).
(©Copyright 2002. IEEE. All rights reserved).
Figure 19.2: Public key encryption allows Alice to verify that a message from Bob actually came from him and that it is unaltered from the original. Here’s how: Bob encrypts the hash value with his private key; encrypts the plaintext with Alice’s (green) public key; and sends both to her. Alice then decodes the received ciphertext using her own [orange] private key; decodes the hash value using Bob’s public key, thereby confirming the sender’s authenticity; and compares the decrypted hash value with one that she calculates locally on the just decrypted plaintext, thereby confirming the message’s integrity.
(©Copyright 2002. IEEE. All rights reserved).
Chapter 20: Summary, Conclusions, and Recommendations
Figure 20.1: A joint CSI/FBI study determined that an overwhelming number of desktop attacks (81%) came from disgruntled employees.
(©Copyright 2002. Computer Security Institute. All rights reserved).
Figure 20.2: The 2000 CSI/FBI study totals losses incurred from data loss, fraud, or abuse for 273 respondents at $265,589,940.
(©Copyright 2002. Computer Security Institute. All rights reserved).
< Day Day Up >
Previous page
Table of content
Next page
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors:
John R. Vacca
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Key Skills of Project Managers
Defining a Project
Management Fundamentals for Project Control
Managing Project Deliverables
Identify, Protect, and Track: The Principles of Managing Work Products
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
The Loopback Interface
Interior Routing Protocols
QoS Device Manager
Routine Security Measures
A.1. IPv4 Subnetting
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Writing Functions and Subroutines
Using Arrays
Formatting Charts
Converting Between Number Systems
Achieving a Certain Future Value
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Working with Ideas
Value Stream Mapping and Process Flow Tools
Voice of the Customer (VOC)
Descriptive Statistics and Data Displays
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Trim-Out Installation
Troubleshooting Structured Wiring
Distributed Audio System Basics
Distributed Video Basics
Troubleshooting Audio Systems
VBScript in a Nutshell, 2nd Edition
Global Code
Program Flow
Section A.7. Dictionary Object
Section A.15. String Manipulation
Section C.4. Logical and Bitwise Operators
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies