Index_N


N

Napster, 59–60, 364

Narrow dissemination of confidential and/or illicit materials, 151

Narrow targeting, 542, 662

National Center for Victims of Crime, 600

National Institute of Standards and Technology (NIST), 182

National Institute of Standards and Testing, 29

National White Collar Crime Center (NW3C), 26

Nbtstat, 377, 531

Near Instant Messaging (NIM), 502

Neidorf, Craig, 65–6

Neighborhood Data, 354

Net:

session command, 470

Threat Analyzer, 264

"NET" framework, 255

NetBIOS, 273, 334, 362, 449, 470

Netcat, 295, 537, 539

NetDetector, 408

NetFlow, 363, 377, 390, 451, 467

Netherlands Forensic Institute, 351

NetIntercept, 29, 380, 408–9, 437, 439

forensics view, 436

graphical user interface, 435

NetOptics, 429

NetScanTools Pro for Windows, 445–2

Netscape, 280, 282, 316, 329

cache "index.db" database, 317

history database, 233, 238, 331

newsreader, 281

Netstat, 449, 469–70, 488, 531

NetWitness, 29, 408

Network:

based attacks targeting critical infrastructure, 10

connection using Internet Protocols, 370–80

device logs, 466–9

eavesdropping, 419

information system, 376

locating entry points, 393

logs, 416

monitoring tool, 419

neighbourhood, 283

process of gathering information about, 385

related data, 413

setting up, 453

state information, 104

storage, 283–85

technical overview of, 362–4

technologies, 365–8, 420

three-phase approach, digital evidence on, 391

traces, 319

traffic analysis tools, 408

vulnerability assessment, 386

Network digital evidence

class/individual characteristics and evaluation of source, 402–406

documentation, collection, and preservation, 395

filtering and data reduction, 400–1

identification, 390–95

recovery, 406–8

reporting results, 416–17

Network File System (NFS), 320, 376

Network Forensic Analysis Tools (NFATs), 14

Network Interface Card (NIC), 361–2, 365, 419, 424, 438, 670

Network layers, 422–7, 666

addresses, 438

digital evidence at, 441

Domain Name System (DNS), 445

encapsulation, 422–7

Internet Protocol and Cellular Data Networks, 443–4

IP Addresses, 444–5

TCP/IP, 442

see also Data-link layers; Transport layers

Network News Transport Protocol see NNTP

Network Solutions, 455

Network Time Protocol (NTP), 469

New York v. Ferber, 49

NewsGroups, 479, 485–6, 670

NFR Security, 408

NFT Security, 29

Nmap, 406, 449

nmap-os-fingerprints, 406

NNTP-Posting-Host and X-Trace headers, 508, 510

No Electronic Theft Act, 58

No-IP, 456

Nokia Wireless Access Point, 425

North American terrorist threats, 208

Norton:

Commander, 263

Disk Doctor, 327

Disk Editor, 257, 325

DiskEdit, 262

Unerase, 327

NT Event Logs, 271, 413

NTFS, 202, 260–1, 326

creation time, 293

drive, 256

file systems, 266–7, 300

record modified time, 293

NTI, 28, 264, 270

Graphics Image File Extractor, 267

Ntlast utility, 400




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net