Index_E

 < Day Day Up > 



E

E*Trade, 405

E-911 (enhanced 911) intiative, 471–72

E-911 service Phase I directive, 482

E-911 service Phase II directive, 482

E-911 services, 482

EarthLink, 398

Eastern European organized crime groups, 520

eBay Inc., 239, 335, 405, 520

E-Bombs (Electromagnetic bombs), 427–29, 430

Echelon, 387, 412, 547

e-commerce investigations, 40, 148

economic crimes, 637

economic espionage, 260

EDS, 247

eEye, 593

EFF Web site, 333

Egghead.com Inc, 522

Egyptian Ikhwan al-Muslimoon (Muslim Brotherhood), 328

Egyptian Islamic Jihad, 369

e-hippies, 332, 407

electric power disruption technology, 357–58

electric power system vulnerabilities, 510–11

electrohypnomentalophone, 547–48

Electro-Magnetic Pulse (EMP), 357, 427–28

Electronic Communication Privacy Act (ECPA, 607

electronic evidence discovery action agenda, 188–89

electronic evidence discovery conclusions, 187–88

Electronic Frontier Foundation (EFF), 331–32

electronic immune system, 510

electronic jamming, 442

electronic paper trails, 123, 185, 412–13

Electronic Privacy Information Center (EPIC), 412, 527

electronic privacy laws, 148, 175

electronic serial numbers (ESNs), 539

Electronic Support Measures (ESM), 431

e-mail wiretaps, 451–52

emergency guidelines, 147–48

emergency operating mode, 475–76

emergency service, 10

Emitter Locating Systems (ELS), 431

Employee Provisioning System, 594–95

Employer Safeguard Programs, 5–6

EnCase™, 138, 158, 609

encrypted copies, 173, 176

encryption frailties, 563–64

enemy identification, 519

Energy and Justice Departments, 342

Energy Department, 343

Energy Secretary Bill Richardson, 364

eNet Secure, 67

English 1968 Act, 25

English Civil Evidence Act, 25

enhanced signal strength (ESS) method, 481

EnRole Version, 4.0, 594

En Route Mission Planning and Rehearsal System (EMPRS), 297

Enterasys Network, 585–87

Enterasys Networks Dragon Sensor™, 60, 585–87

Entercept Security Technologies, 585

enterprise-class back-up solution, 100

ethical challenges of IW

1997 Defense Science Board’s threat analysis report, 515

armed attacks, 514–15

Article 41, 514

Cuban missile crisis, 513

enemy identification, 519

espionage, 48, 261, 289, 515, 618

hacker’s ethic, 573

internal computer modification, 515

Internet security firm 2XS Ltd, 355

Israeli Internet Underground, 354–55

IW response techniques, 517–18

jus ad bellum, 5113

jus in bello, 514

low-intensity conflict, 306, 515

nation-state, 513, 515

operations other than war (OOTW, 513

SecurityFocus.com, 76, 355, 543

SODA project, 354

Entrust Technologies, 247

Environmental Protection Agency, 342

eProvision Day One, 594

erasable programmable read-only memory (EPROMs), 19

erased files, 45, 85, 151–52, 185

Eric Drexler, 461

escrowed encryption, 411

espionage, 48, 261, 289, 298, 359, 515, 618

Ethernet, 100, 439

Ethernet-based networks, 611

ETH Zurich, 559

Eudora, 452

Eugene E. Habiger, 364

European Parliament President Nicole Fontaine, 547

European Telecommunications Standards Institute (ETSI), 483

European Union privacy directive, 528–29

event reconstruction, 27, 133

evidence capture, 68–69

evidence collection and data seizure action agenda, 140–41

evidence collection and data seizure conclusions, 140

evidence examination, 138–39

evidence linking, 203

evidence preservation

/V (data verification), 146

bit stream back-up, 35, 82, 145–46, 148, 150

Chuck Guzis, 145

Cyclic Redundancy Codes (CRCs), 145

data duplication, 7

digital crime scene, 143–46

DOS DISKCOPY, 146

Federal Law Enforcement Training Center, 145, 192

IMDUMP, 145

log preservation, 611

Michael White, 145

mirror image back-ups, 35–36

MS DOS Version 6.22, 146

Paul Mace Software, 145

SafeBack software, 35–37, 138, 145–46, 609

SnapBack, 145–46

Sydex, 145

Trojan Horse Programs, 37, 82, 240, 440–41, 584

unaltered data, 128

useable formats, 211

evidence processing methodology, 35, 81–82, 590–91

evidence processing steps, 146–47

evidence service options, 10

evidence transportation, 138, 149, 158

evidential material procedures

.cab files, 166

.ocx files, 166

32-bit .exe files (PE files), 166

active content, 166

ActiveX controls, 166

Authenticode, 165–67

Certification Authority (CA), 167

Class 3 Digital ID, 166

client application security warning, 170

content integrity, 165, 168

content source, 165, 168

cryptographic digest, 168

digital certificate (See Digital IDs™)

Digital IDs™, 167–68

Digital IMAGE Verification and Authentication protocol, 164

digital signatures, 132, 155, 165, 167–68

DiskSearch Pro, 590

Exchange, 166

Internet Explorer, 166

Java™, 166

Law Enforcement Suite, 590

NetProwler, 590

New Technologies, 590

Outlook Express, 166, 373, 452

Outlook, 166, 373, 452,

PKCS #10 signature standards, 168

PKCS #7 signature standards, 168

public key cryptography, 167–68, 195

public/private key pair, 167–69

publisher identity, 166

second channels, 164

security warning screens, 169–70

SIGNCODE.EXE utility, 168

software accountability, 165

Software Developer Digital ID, 168–69

Symantec, 247, 585, 590

VeriSign(r) root Private Key, 168

VeriSign’s Digital IDs™, 165–66, 169

Win32 applications, 168

WinVerifyTrust API, 168

X.509 v3 certificates, 168

evidentiary value, 185

EvilPing, 353

examination of data media, 19

Excel, 44, 211, 214–15, 489, 491–92 (MS)

Excel 2000 documents, 489, 491–92

Exchange, 166

exchange private session keys, 195

Executive IW-D Oversight Office, 311

Executive Office of the President, 310

Executive Order, 110–11, 510

Exigent International Inc., 433–34

Exodus, 66–67

Exodus Communications, 66–67, 398

expert witness services, 6–8

Expert Witness Testimony on Electronic Evidence course, 80

Explorer, 530

export rules, 363



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net