Index_C

 < Day Day Up > 



C

C2 systems, 292

C2W (See Command and Control Warfare)

C2W strategies, 292

Cadillac, 443

California-based Institute for Historical Review, 329

California Institute of Technology, 460

call counting, 540–41

Caltarian security service, 588

Campaign for Radical Truth in History, 327

Campaign for the Defense of Legitimate Rights (CDLR), 327–28

Canadian government, 417

CareGroup Healthcare System, 545

Carnegie Mellon University, 174, 230

Carnivore, 448–51, 472

case histories: con men, 21–22

case histories: disk-recovery, 114–17

Case Study One: The Case of the Flying Laptop, 24

Case Study Two: The Case of the Burned Tapes, 24

Caucasus Web war, 245

CCRibber, 408

CDB Infotek, 531

CD-ROMs, 209–11

Cell-Loc Inc., 471

cellular digital packet data (CDPD), 485

cellular handsets distribution, 542

Cellular One, 535

cellular service providers, 535–36

Cellular Telecommunications Industry Association (CTIA), 472, 538

Center for Advanced Aviation Systems Development (CAASD), 493–94

Center for Strategic and International Studies (CSIS), 350

Centers for Disease Control and Prevention, 343

Centrax, 3.0 software, 587

CentraxICE, 587

CERT Advisory CA-1992-19, 155

CERT Coordination Center security incident reports, 584

CERT(r) Coordination Center (CERT/CC), 174–75

Certificate of Completion, 38, 170, 83

Certification Authority (CA), 167

Certified Information Systems Security Professional (CISSP), 78–79, 608

Certified Systems Engineer (MCSE), 608

Chad Mirkin, 460

Chain of Custody

analysis, 128, 158

contamination, 132

documentation, 136

establishment, 155

event reconstruction, 133

legal requirements, 135, 156

maintenance, 154, 158

notebooks, 157

secure location, 149, 157

snapshots, 136

timestamps, 133

training, 38

transportation, 149

Change Accumulation component, 112

character strings, 213

Charlemagne Hammer Skins, 330

Check Assets function, 117

checksums, 610

chemical weapons, 313–15

Cheng Wang, 243

Chief Information Officers (CIOs), 173–76, 197

child exploitation, 9

China Electronic Systems Engineering Company, 360–61

China’s Ministry of Public Security, 244

China’s State Encryption Management Commission, 566

Chinese embassy bombing, 283, 350

Chinese-made encryption devices, 360–61

Chinese second strike capability, 362

chipping, 299–300, 426, 441

chronometer, 444

Chuck Guzis, 145

Church of Scientology, 581

CIA, 546

CIBA-Geigy Corporation, 223

CIH, 352

Cisco Systems (formerly Arrow-Point Communications

anomaly-based network IDS products 86

routers 67

IDS development 585

Secure IDS 586

IDS switches 61

IT-ISAC (Information Technology Information Sharing and Analysis Center) 247

military useage 294

Network Associates, Inc. (NAI) 66

Secure IDS 586

Citibank, 574

Citigroup Inc., 388

civil litigations, 15, 27–28, 186

Civil Search Order, 22

civilian information operation (CIO), 508

CIW professional certification, 78

Class, 3 Digital ID, 166

CLD Consulting Engineers Inc., 398–99

Click + Drag Goth club, 331

client application security warning, 170

clients, 98

Clinton administration, 360, 473, 572

Clinton impeachment hearings, 49

CLIPPER Chip, 411, 519

clock filters, 194

cloned phones, 540

CNN, 250, 347, 405, 520

CNN.com, 405, 520

CoABS (See control of agent-based systems)

Coalition For Human Dignity, 307

code-division multiple access (CDMA), 478, 538

Codex Data Systems (CDS)

Cold War-era defense-spending, 288–89

collection notebooks, 156–57, 159

Collin Shu, 360

Columbine High School, 40

combat scenarios, 296–97

Command and Control Warfare (C2W), 289–92

command-and-control warfare campaign, 254

Commercial Bank of San Francisco, 388

commercial intrusion-detection software, 294

commercially available encryption, 387

common law tradition, 16–17

Communist Party, 347

company’s security officer, 175

Compaq Computer Corp., 199

Competition Act, 183–84

competitive intelligence (CI), 196, 200–01

Complementary Metal Oxide Semiconductor (CMOS), 138

comprehensive system back-ups, 299

Comprehensive Test Ban Treaty, 363

comprehensive testing and validation, 264

Computer Associates, 247

Computer Associates International, Inc. v. American Fundware, Inc., 133 F.R.D. 166 (D. Colo. 1990), 224

Computer Emergency Response Team (CERT), 55, 63, 228, 230, 571

Computer Forensic Incident Response Procedures (CFIRP), 62–64

Computer Forensics Experiment 2000 (CFX-2000), 32–33

computer forensics expert’s salaries, 576–77

computer literate criminals, 350

computer memory cards, 626

computer peripherals, 19

computer scams, 350

Computer Sciences Corp, 295

Computer Security Institute, 46, 69, 399, 569

Computer Security Institute/FBI survey, 46, 69, 399, 569

Computer Security Resource Center, 569

computer security reviews, 43

computer viruses, 259, 287–88, 440

Concordance, 213

Concurrent Pointer Checking function, 113

Conditions of Use policy, 63

configurable GUI interface, 221

Congress of Vienna, 383

consolidation attacks, 242, 255

consumer privacy, 530

content analysis, 264

content integrity, 165, 168

content searches, 625

content source, 165, 168

contraband, 606

controlled boot process, 621–22

control of agent-based systems (CoABS), 283

Conxion, 407

Cookie Crusher, 531

cookie-management tools, 488

CookieMaster, 531

Cookie Pal, 531

cookies, 413, 582

Coordinated Universal Time (UTC), 444

Coordinating Committee for Multilateral Strategic Export Controls (COCOM), 567

copper cable media, 438, 500

Cornell University, 459

corporate security/investigations personnel requirements, 619–21

Corsair Communications Inc., 539–40

Counterintelligence Center annual report, 434

counternarcotics relationships, 301

Counterpane Internet Security Inc., 66–67, 524, 559

counterterrorism operations, 302–03, 369

countries with IW attack capabilities, 259–61

covert antiterrorism organization plans, 426

CRC algorithm, 625

credit cards, 22

credit system’s personal identification, 533

Creditcards.com, 522

Criminal Code, 183

Critical Infrastructure Assurance Office (CIAO), 340, 383, 511

Critical Infrastructure Protection Directorate, 383

critical national infrastructures, 510

cryptographic digest, 168

cryptography, 168, 335, 565

CRYSTAL, 499

CTC Communications, 398–99

Cuba, 271, 373

Cuban missile crisis, 513

Cult of the Dead Cow Communications (cDc), 331

CyberArmy, 318–19

cyberarsenals, 350

CyberCop intrusion-detection software, 66

cybercrime treaty, 265–66

cyberdefense unit, 296

cyberdisarmament process, 271

cyber foot prints

angle of arrival (AOA) method, 477

car theft, 475

code-division multiple access (CDMA), 478, 538

criminal tracking, 475

differential GPS (DGPS), 446, 480

emergency operating mode, 475–76

enhanced signal strength (ESS) method, 481

forward link trilateration (FLT), 478

global positioning system (GPS), 478–79

Life Service Center, 474

Locus Corp., 474, 481

LoJack Corp., 477

Lucent Technologies Inc., 198, 480

packet data, 476–77

paging mode, 476

personal handy phone systems (PHS), 475–76

personal locator system (PLS), 474–75

PHS phone handset, 481

PHS service areas, 481

postage-stamp-sized chipset (Star II), 480

RF-tagged wildlife, 477

server-assisted GPS, 479–480

signal direction, 477–78

signal strength method, 480–81

signal timing methods, 480–81

SiRF Technology Inc., 443, 480

system architecture, 475–76

time difference of arrival (TDOA), 478

vehicle theft, 476–77

vehicular locators, 475

voice channel communications, 476

Cyberincident Steering Group, 246

cyberinsurance, 70–71

cyberintrusions pricing, 525

cyberpanel, 280–81

CyberSafe, 585, 587

Cyberspace Electronic Security Act (CESA), 411, 473

cyberspace hot pursuit capability, 203

Cyberspace Policy Institute of George Washington University’s 2001 encryption product survey, 568

cyberstrikes, 280, 295, 330, 346, 371

cybertactics, 243, 295–96

cybotagged, 427

Cyclic Redundancy Codes (CRCs), 145

cyclical redundancy checksums (CRCs), 36, 145

cylinder-head-sector (CHS), 623

cypherpunk, 414

Cyveillance, 409



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net