Index_I

 < Day Day Up > 



I

IBM (See International Business Machines)

ICEpak, 597

ICMP Traceback Messages, 406

IDCAMS delete/define control statements, 113

iDefense, 352

Identicator Technology, 397

identification/information fraud Title 18, Section 1028 of the U.S. Code, 541

identify data storage anomalies, 39, 83

Identify-Preserve-Analyze-Report model, 629

identity fraud, 532–35

IDS appliance, 585–87

IDS development, 585

IDS software vendors, 587

IDS switches, 61

IEEE Transactions on Information Theory, 561

IFC, 637

Igor Yarimaka, 570

IIS 4 holes, 354

Ikhwan al Muslimoon, 326

Illinois Institute of Technology’s Research Institute (IITRI) review, 449–451

image back-ups, 103

Image Copy, 112

image verification and authentication action agenda, 178–179

image verification and authentication conclusions, 176–78

IMAP (143), 592

IMDUMP, 145

Imperial College, 327

IMS Command utility, 113

IMS Database Change Accumulation utility, 112

IMS Database Recovery utility, 112

IMS Recovery Control (RECON), 111–12, 117

Inactive Account Scanner, 595

incident coordinator, 156

incident-handling procedures, 156

incident reporting, 228–29

Incident Response Policy, 156

incremental back-ups, 101–02

Index Rebuild function, 114

India, 261, 263–64, 271, 312, 418

India’s Congress Party, 312

India’s National Information Infrastructure- Defensive group, 261

indications and warnings (I and W) system, 311

Indonesian Embassy, 349

InfoGlide Corporation, 245

Information America, 531

information and communication technologies (ICTs), 305–07

Information Directorate, 32–33

information extraction (IE), 499

information flows, 439

Information Management System (IMS), 110–11

information peace-keeping (IP), 385–86

information relevance examples, 493–94

information teams, 200–01

Information Technology Association of America, 247, 406

Information Technology Information Sharing and Analysis Center (IT-ISAC), 406

information technology policy (ITS), 58

information technology systems (ITS), 286, 299

information warfare (IW) planning exercises, 394–95

information warfare defense unit, 261

InfoSec certification, 77–78

info-weapons arsenal, 426–27

InfraGard, 63, 272–73

INMARSAT satellite telephone, 371

insider attacks, 56, 204, 595

insurance companies, 15, 70–71

Insurance Information Institute, 523

insurer-certified security firm, 524

integrated development environment (IDE)119

Intel cybersecurity, 247

Intel™-based computer systems, 36

intelligent forensic filter, 44

intended performance analysis, 264

interactive visualization interface, 220–21

internal auditor education, 174

internal audits, 38

internal computer modification, 515

internal events, 56

Internal Revenue Service’s Criminal Investigation Division, 36

International Association of Computer Investigation Specialists (IACIS), 35, 192, 578

International Business Machines (IBM)

3590 drive, 116

Almaden Research Center, 461

Database Image Copy utility, 112

future applications, 463

Hewlett-Packard, 247, 463, 524

nano team, 462

IBM's pervasive computing division, 470

IMS Database Change Accumulation utility, 112

IMS Recovery Control (RECON), 111–12, 117

Information Management System (IMS), 110–11

magnetic materials creation, 462

Microsoft, 335

molecular computers, 463

nanomushrooms, 463

nano team, 462

pervasive computing division, 470

polymer form,s 463

Samuel Stupp, 463

self-assembling entities, 463

silicon fingers, 459

UCLA, 463

International Data Encryption Algorithm (IDEA), 559

International Hi-Tech Crime and Forensics Conference (IHCFC) of October 1999, 227–28

international laws violations, 518–19

international neo-Nazi network, 330

International Organization on Computer Evidence (IOCE), 227

international security environment, 382–83

international societal insulation, 253

internet abuse identification and detection, 45, 85

Internet attack planning, 325, 373

Internet Cafés, 22

Internet content identification, 408

Internet Control Message Protocol (ICMP), 193

Internet Defense Summit, 334–35

Internet Engineering Task Force, 406

Internet Explorer, 166, 488–89, 582

Internet forum, 306

Internet gateway, 239

Internet image copying, 490

Internet IW monitoring firms, 408

Internet-related investigations, 83, 148

Internet Relay Chat (IRC), 405

Internet security audit, 635

Internet security firm 2XS Ltd, 355

Internet Security Systems (ISS), 60, 65–66, 247, 585, 590, 597

Internet self-regulation, 318

Internet systems isolation, 299

Internetwide cooperation, 405–07

intoxicant function, 253

Intrusion.com, 586

intrusion detection services, 65

intrusion detection software, 585

Intrusion Detection Systems (IDS), 59–60, 219–20, 293–94

intrusion response, 228

Iomega Zip disks, 209–11

iPayment Technologies Inc., 522

IP sessions, 221

IP spoofing, 406

IP-to-MAC conversions, 611

IPv4, 501

IPv6, 501

IRA, 317

Iran, 253, 261

Iraq, 261, 293

Iraqi air attacks, 293

Iraqi air defense system, 293

Iraqi C2 system, 293

Iraqi OODA loop, 293

Iridium LLC, 434

Isaac Asimov, 270

Islamic Association for Palestine, 328

Islamic Liberation Army (ILA), 427

Islamic Liberation Party, 327–28

Islamic Movement of Uzbekistan, 359

Islamist diaspora, 307

Islamists, 329, 307, 370

ISP security

Ameritech, 398

AT&T, 398

Boston ISP Breakaway, 399

CLD Consulting Engineers Inc., 398–99

Computer Security Institute, 46, 69, 399, 569

CTC Communications, 398–99

EarthLink, 398

Exodus Communications, 66–67, 398

Gartner Group ISP report, 401

ISP’s security guidelines, 394, 398

network inspections, 399

Policy Enforcement Group, 399

PSINet, 398

San Francisco FBI Computer Intrusion Squad, 399

security demands, 398

security guidelines, 394, 398

service level agreement (SLA), 399–400

Visa International, 335, 401

Israeli Defense Forces, 262

Israeli Foreign Ministry, 353

Israeli Internet infrastructure destruction plan, 355

Israeli Internet Underground, 354–55

Israeli ISP NetVision, 354

Israeli Parliament (the Knesset), 262

Israeli-Palestinian cyberwar, 262

Israel’s cyberwar seminar, 262–64

IT system protection directive, 589

IW and democracy, 519–20

IW arsenal and tactics of private corporations action agenda, 420–22

IW arsenal and tactics of private corporations conclusions, 420–22

IW arsenal and tactics of terrorists and rogues action agenda, 377–78

IW arsenal and tactics of terrorists and rogues conclusions, 375–377

IW arsenal and tactics of the military action agenda, 321–322

IW arsenal and tactics of the military conclusions, 320–21

IW arsenal of the future action agenda, 464–67

IW arsenal of the future conclusions, 464

IW civilian casualties action agenda, 550–51

IW civilian casualties conclusions, 548–49

IW-D Oversight Office, 310–12

IW response techniques, 517–18

Izz al-Din Al-Kassam Brigades, 328



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net