| < Free Open Study > |
|
EAP start message, 60
Education, 226–233
EFS (Encrypted File System), 110
8.3 naming conventions, 67–68
802.1X, 59–61, 88
E-mail security, 85–86
hardening e-mail servers, 258, 291
hoaxes, 63–64
LFN vulnerabilities, 68–69
PGP (Pretty Good Privacy), 63, 85, 125, 160
S / MIME (Secure Multipurpose Mail Extensions), 63
spam, 62
threats to, 61–62, 83
Embezzlement, 309
Encrypted File System (EFS), 110
Encryption, 47
algorithms for, 154–165
defined, 18, 124
Encrypted File System (EFS), 110
file and folder encryption, 109–110
hash encryption, 150, 163–165, 182, 184
in IPSec, 124
strong encryption, 154, 181
transport mode, 124
tunnel mode, 124
viruses and, 339
see also Cryptography; Keys
Encyclopedias, data encyclopedias, 267–268
Enticement, 316, 319
Entrapment, 316, 319
Escrow for key storage, 178–179, 187
Espionage, 308–309, 319
Ethics, 215–216, 311–313, 319
Evidence of computer related crimes, 222–223, 235, 322
categories of evidence, 315
chain of custody and, 315, 320, 322
hearsay evidence, 316–317, 319
Expert systems, 275–276, 277, 292
Extranets, 103, 138, 144–145
| < Free Open Study > |
|