Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Types of Computer Forensics Technology
Figure 2.1: CFX-2000 schematic. (
©Copyright 2002, Associated Business Publications. All rights reserved
).
Chapter 4: Data Recovery
Figure 4.1: A back-up using a shared tape library.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.2: A serverless back-up system.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.3: A LAN-less back-up using remote tape server.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.4: A storage area network using serverless back-up.
(©Copyright 2002, StorNet. All rights reserved).
Chapter 7: Computer Image Verification and Authentication
Figure 7.1: Security warning screen.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.2: Client application security warning.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.3: Inspect the certificate and verify its validity.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.4: Authenticode—VeriSign® Digital IDs Process.
(©Copyright 2002. VeriSign. All rights reserved).
Chapter 19: Advanced Computer Forensics
Figure 19.1: In public-key encryption [top], Alice encrypts a message using Bob’s public key, and Bob decrypts it using his private key. This scheme allows encrypted files to be sent in the absence of a secure means to exchange keys, a major improvement over symmetric encryption. It’s still possible, though, for Alice to receive a public key (or a conventional symmetric key) that ostensibly came from Bob, but that, in fact, belongs to a third party claiming to be Bob—the so-called man-in-the-middle attack (bottom).
(©Copyright 2002. IEEE. All rights reserved).
Figure 19.2: Public key encryption allows Alice to verify that a message from Bob actually came from him and that it is unaltered from the original. Here’s how: Bob encrypts the hash value with his private key; encrypts the plaintext with Alice’s (green) public key; and sends both to her. Alice then decodes the received ciphertext using her own [orange] private key; decodes the hash value using Bob’s public key, thereby confirming the sender’s authenticity; and compares the decrypted hash value with one that she calculates locally on the just decrypted plaintext, thereby confirming the message’s integrity.
(©Copyright 2002. IEEE. All rights reserved).
Chapter 20: Summary, Conclusions, and Recommendations
Figure 20.1: A joint CSI/FBI study determined that an overwhelming number of desktop attacks (81%) came from disgruntled employees.
(©Copyright 2002. Computer Security Institute. All rights reserved).
Figure 20.2: The 2000 CSI/FBI study totals losses incurred from data loss, fraud, or abuse for 273 respondents at $265,589,940.
(©Copyright 2002. Computer Security Institute. All rights reserved).
< Day Day Up >
Previous page
Table of content
Next page
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors:
John R. Vacca
BUY ON AMAZON
Qshell for iSeries
Input and Output
Command-Line Arguments
Path-Name Expansion
Sed
Application Development Tools
Strategies for Information Technology Governance
Assessing Business-IT Alignment Maturity
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governance in IT Outsourcing Partnerships
Metrics and Models in Software Quality Engineering (2nd Edition)
Orthogonal Defect Classification
In-Process Metrics for Software Testing
Complexity Metrics and Models
Structure Metrics
Statistical Process Control in Software Development
Special Edition Using Crystal Reports 10
Choosing a Formula Language: Crystal Versus Basic Syntax
Migration of the Crystal Enterprise Repository
The Crystal Enterprise Architecture in Action
Extending Crystal Enterprise
Introduction
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Photoshop Layers and After Effects
Static Matte Painting in Photoshop
Making Movies from Stills
Scale and Speed
Motion Titling Effects
Understanding Digital Signal Processing (2nd Edition)
FFT INPUT/OUTPUT DATA INDEX BIT REVERSAL
AN INTRODUCTION TO INFINITE IMPULSE RESPONSE FILTERS
REFERENCES
IMPROVING TRADITIONAL CIC FILTERS
Appendix E. Decibels (dB and dBm)
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies