Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Types of Computer Forensics Technology
Figure 2.1: CFX-2000 schematic. (
©Copyright 2002, Associated Business Publications. All rights reserved
).
Chapter 4: Data Recovery
Figure 4.1: A back-up using a shared tape library.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.2: A serverless back-up system.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.3: A LAN-less back-up using remote tape server.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.4: A storage area network using serverless back-up.
(©Copyright 2002, StorNet. All rights reserved).
Chapter 7: Computer Image Verification and Authentication
Figure 7.1: Security warning screen.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.2: Client application security warning.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.3: Inspect the certificate and verify its validity.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.4: Authenticode—VeriSign® Digital IDs Process.
(©Copyright 2002. VeriSign. All rights reserved).
Chapter 19: Advanced Computer Forensics
Figure 19.1: In public-key encryption [top], Alice encrypts a message using Bob’s public key, and Bob decrypts it using his private key. This scheme allows encrypted files to be sent in the absence of a secure means to exchange keys, a major improvement over symmetric encryption. It’s still possible, though, for Alice to receive a public key (or a conventional symmetric key) that ostensibly came from Bob, but that, in fact, belongs to a third party claiming to be Bob—the so-called man-in-the-middle attack (bottom).
(©Copyright 2002. IEEE. All rights reserved).
Figure 19.2: Public key encryption allows Alice to verify that a message from Bob actually came from him and that it is unaltered from the original. Here’s how: Bob encrypts the hash value with his private key; encrypts the plaintext with Alice’s (green) public key; and sends both to her. Alice then decodes the received ciphertext using her own [orange] private key; decodes the hash value using Bob’s public key, thereby confirming the sender’s authenticity; and compares the decrypted hash value with one that she calculates locally on the just decrypted plaintext, thereby confirming the message’s integrity.
(©Copyright 2002. IEEE. All rights reserved).
Chapter 20: Summary, Conclusions, and Recommendations
Figure 20.1: A joint CSI/FBI study determined that an overwhelming number of desktop attacks (81%) came from disgruntled employees.
(©Copyright 2002. Computer Security Institute. All rights reserved).
Figure 20.2: The 2000 CSI/FBI study totals losses incurred from data loss, fraud, or abuse for 273 respondents at $265,589,940.
(©Copyright 2002. Computer Security Institute. All rights reserved).
< Day Day Up >
Previous page
Table of content
Next page
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors:
John R. Vacca
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle Structures
Oracle SQL
Appendix A Common Issues
Appendix B Functions
Qshell for iSeries
Archives and Compression
Sed
Accessing OS/400-Specific Objects
The Perl Utility
Java Development Tools
Image Processing with LabVIEW and IMAQ Vision
Introduction to IMAQ Vision Builder
NI Vision Builder for Automated Inspection
Other Image Sources
Camera Interfaces and Protocols
Image Analysis
FileMaker Pro 8: The Missing Manual
Stored, Unstored, and Global Fields
Script Steps
Security
Export Formats
Developer Utilities
Data Structures and Algorithms in Java
Vocabulary
Shrinking and Stretching Arrays
The LinkedList Class
Asymptotic Notation
Summary
PMP Practice Questions Exam Cram 2
Answers and Explanations
Project PlanningFacilitating Processes
Answers and Explanations
Project Closing
Exam Prep Questions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies