Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Types of Computer Forensics Technology
Figure 2.1: CFX-2000 schematic. (
©Copyright 2002, Associated Business Publications. All rights reserved
).
Chapter 4: Data Recovery
Figure 4.1: A back-up using a shared tape library.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.2: A serverless back-up system.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.3: A LAN-less back-up using remote tape server.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.4: A storage area network using serverless back-up.
(©Copyright 2002, StorNet. All rights reserved).
Chapter 7: Computer Image Verification and Authentication
Figure 7.1: Security warning screen.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.2: Client application security warning.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.3: Inspect the certificate and verify its validity.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.4: Authenticode—VeriSign® Digital IDs Process.
(©Copyright 2002. VeriSign. All rights reserved).
Chapter 19: Advanced Computer Forensics
Figure 19.1: In public-key encryption [top], Alice encrypts a message using Bob’s public key, and Bob decrypts it using his private key. This scheme allows encrypted files to be sent in the absence of a secure means to exchange keys, a major improvement over symmetric encryption. It’s still possible, though, for Alice to receive a public key (or a conventional symmetric key) that ostensibly came from Bob, but that, in fact, belongs to a third party claiming to be Bob—the so-called man-in-the-middle attack (bottom).
(©Copyright 2002. IEEE. All rights reserved).
Figure 19.2: Public key encryption allows Alice to verify that a message from Bob actually came from him and that it is unaltered from the original. Here’s how: Bob encrypts the hash value with his private key; encrypts the plaintext with Alice’s (green) public key; and sends both to her. Alice then decodes the received ciphertext using her own [orange] private key; decodes the hash value using Bob’s public key, thereby confirming the sender’s authenticity; and compares the decrypted hash value with one that she calculates locally on the just decrypted plaintext, thereby confirming the message’s integrity.
(©Copyright 2002. IEEE. All rights reserved).
Chapter 20: Summary, Conclusions, and Recommendations
Figure 20.1: A joint CSI/FBI study determined that an overwhelming number of desktop attacks (81%) came from disgruntled employees.
(©Copyright 2002. Computer Security Institute. All rights reserved).
Figure 20.2: The 2000 CSI/FBI study totals losses incurred from data loss, fraud, or abuse for 273 respondents at $265,589,940.
(©Copyright 2002. Computer Security Institute. All rights reserved).
< Day Day Up >
Previous page
Table of content
Next page
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors:
John R. Vacca
BUY ON AMAZON
Programming Microsoft ASP.NET 3.5
Web Forms Internals
The ADO.NET Object Model
ASP.NET Mobile Controls
Extending Existing ASP.NET Controls
Hosting ASP.NET Outside IIS
Special Edition Using Crystal Reports 10
Creating and Designing Basic Reports
Troubleshooting
Using Crystal Enterprise with Web Desktop
Using Crystal Enterprise Notifications
An Introduction to SQL
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
VBScript Basics
Conditional Logic
Using Procedures to Organize Scripts
Handling Script Errors
PMP Practice Questions Exam Cram 2
Project Initiation
Project PlanningCore Processes
Project Execution
Answers and Explanations
Exam Prep Questions
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Starting Command-Line SQL*Plus
The Working Directory
Executing SQL*Plus Commands
Another Approach to Headers
Where to Find More Tuning Information
Special Edition Using FileMaker 8
Understanding Relationships
FileMaker Extra: Creating a Script Library
Converting Files
Post-Conversion Tasks
FileMaker Extra: Exploiting the FileMaker-to-FileMaker Import
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies