List of Figures

 < Day Day Up > 



Chapter 2: Types of Computer Forensics Technology

Figure 2.1: CFX-2000 schematic. (©Copyright 2002, Associated Business Publications. All rights reserved).

Chapter 4: Data Recovery

Figure 4.1: A back-up using a shared tape library. (©Copyright 2002, StorNet. All rights reserved).
Figure 4.2: A serverless back-up system. (©Copyright 2002, StorNet. All rights reserved).
Figure 4.3: A LAN-less back-up using remote tape server. (©Copyright 2002, StorNet. All rights reserved).
Figure 4.4: A storage area network using serverless back-up. (©Copyright 2002, StorNet. All rights reserved).

Chapter 7: Computer Image Verification and Authentication

Figure 7.1: Security warning screen. (©Copyright 2002. VeriSign. All rights reserved).
Figure 7.2: Client application security warning. (©Copyright 2002. VeriSign. All rights reserved).
Figure 7.3: Inspect the certificate and verify its validity. (©Copyright 2002. VeriSign. All rights reserved).
Figure 7.4: Authenticode—VeriSign® Digital IDs Process. (©Copyright 2002. VeriSign. All rights reserved).

Chapter 19: Advanced Computer Forensics

Figure 19.1: In public-key encryption [top], Alice encrypts a message using Bob’s public key, and Bob decrypts it using his private key. This scheme allows encrypted files to be sent in the absence of a secure means to exchange keys, a major improvement over symmetric encryption. It’s still possible, though, for Alice to receive a public key (or a conventional symmetric key) that ostensibly came from Bob, but that, in fact, belongs to a third party claiming to be Bob—the so-called man-in-the-middle attack (bottom). (©Copyright 2002. IEEE. All rights reserved).
Figure 19.2: Public key encryption allows Alice to verify that a message from Bob actually came from him and that it is unaltered from the original. Here’s how: Bob encrypts the hash value with his private key; encrypts the plaintext with Alice’s (green) public key; and sends both to her. Alice then decodes the received ciphertext using her own [orange] private key; decodes the hash value using Bob’s public key, thereby confirming the sender’s authenticity; and compares the decrypted hash value with one that she calculates locally on the just decrypted plaintext, thereby confirming the message’s integrity. (©Copyright 2002. IEEE. All rights reserved).

Chapter 20: Summary, Conclusions, and Recommendations

Figure 20.1: A joint CSI/FBI study determined that an overwhelming number of desktop attacks (81%) came from disgruntled employees. (©Copyright 2002. Computer Security Institute. All rights reserved).
Figure 20.2: The 2000 CSI/FBI study totals losses incurred from data loss, fraud, or abuse for 273 respondents at $265,589,940. (©Copyright 2002. Computer Security Institute. All rights reserved).



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net