Index_D

 < Day Day Up > 



D

DACOM, 434

Daniel Inouye, 337

Darpa (Defense Advanced Research Projects Agency), 499

database filename extensions

.asc, 214

.csv, 213–14

.dbe, 214

.dbf, 213–14

.htm, 213–14

.html, 213–14

.mda, 214

.mdb, 214

.mde, 214

.mdw, 214

.tab, 214

.txt, 214

.xls, 214

Database Image Copy utility, 112

data-entry databases (DEDBs), 112

data-evidence-recovery cost, 612–14

DataHaven Project Inc., 331

data-hiding techniques, 38

date and time, 159

dated tickets, 193

datestamp audit trail, 36, 150, 625

datestamps, 624

David Irving and Fredrick Toben’s Australian Adelaide Institute, 329

David Myatt, 330

David Schriner, 271–72

DBRC support, 112–113

DDoS attack, 632–34

dead drop information, 334, 443

debit cards, 22

decryption, 410

dedicated hosts, 133

dedicated SAN topology, 101

DEE (See Discovery of Electronic Evidence)

default security settings, 335

Defense Advanced Research Projects Agency research contract, 548

defense analyst, 282

Defense Information Systems Agency (DISA), 294

Defense Intelligence Agency, 294, 373

Defense Science Board, 510

Defense Science Board Task Force on Information Warfare report, 240

Defense Secretary Donald Rumsfeld, 336–37

defensive information technology, 31

Delaware State Police, 531

delete command, 224, 412

delete function, 151

deleted files, 148, 625

demon.co.uk (Demon Internet), 75

denial-of-service (DoS) attacks, 392, 405, 407, 521

Department of Commerce, 387

Department of Energy and the National Security Agency, 259

Department of Energy’s weapons laboratory, 346

Department of Health and Human Services (HHS), 342

Department of Veterans Affairs, 343

Deposit Companies, 524

Deputy Secretary of Defense, 295

desktop PC clock, 193

DF-31 missile, 362

Diablo, 573

DIBS(r) system, 172–73

differential GPS (DGPS), 446, 480

Diffie-Hellman key exchange, 195

Diffie-Hellman public key algorithm, 564

dig command, 73

Digital Angel chip, 470–71

digital audio tape (DAT), 24–25

digital certificate (See Digital IDs™)

digital certificates expiration, 169

digital crime scene, 143–46

Digital Detective Workshop, 47

digital evidence bags (DEBs), 33

digital evidence service options, 10

digital evidence standards, 627–28

Digital IDs™, 165–68, 171

Digital IMAGE Verification and Authentication protocol (definition), 164

DIGITAL INTEGRITY VERIFICATION AND AUTHENTICATION protocol, 171–72

digital Pearl Harbor, 239, 285, 288, 308, 333

digital phones, 538–39

digital signatures, 132, 155, 165, 167–68

digital watermark, 415

dig -x /nslookup, 73

Dionne Smith, 341

diplomatic cyber-strategy, 254–55

DIR command, 144

Direct Attack Munition (JDAM), 435

Direct memory access (DMA), 145

Directive 5100.77 rules of engagement, 519

directorate of critical infrastructure protection (CIP), 383

Director of Central Intelligence, 259

disabling cookies, 489

Discovery of Electronic Evidence (DEE)

ambient data, 185

best evidence rules, 185

civil litigation, 186

Criminal Code, 183

criminal litigation cases, 186

DOS operating system, 186

evidentiary value, 185

File |Properties, 214

government investigators, 184

historical perspective, 186

human rights codes, 183

IBM (See International Business Machines)

legal document discovery process

paper documents, 185–86

paper trail, 123, 185, 412–13

plaintiffs’ lawyers, 184

tax acts, 183

disgruntled employees

Bricsnet, 596–97

disenfranchised, 589–90, 594

e-mail, 148

Employee Provisioning System, 594–95

Employer Safeguard Programs, 5–6

Herbert Pierre-Louis, 595

hostile workplace environment, 69

National Infrastructure Protection Center (NIPC), 204, 247, 272, 346, 511, 570, 607–08

Newark U.S. District Court, 2001 trial, 596

Omega Engineering’s Bridgeport manufacturing plant, 595–96

Philadelphia’s Third Circuit Court of Appeals, 596

Purity Wholesale Grocers, 595

Steinberg Diagnostic Medical Imaging, 596

virtual employees, 66

diskette analysis tools, 38–39

diskette/computer matching, 44, 84

disk screening, 299

DiskSearch Pro, 590

disk structure, 44, 84

distributed database (DNS), 229–30

Distributed DoS (DDoS) attacks, 584

DNA cryptography, 416–17

DNS (53), 592

documentation of findings, 153, 608

document catalog, 152

document comparisons, 215, 626

documented analysis plan, 159

documenting investigative activities, 627

documents, 44, 144, 211–12, 488–89

document searches, 6–7, 150–52

DoDi, 353–55

Dollens And Associates, 199

domain names, 75

Doomsday Software, 246

DoS (See denial of service)

DOS, 80, 41, 151, 146, 153, 186,

DOS DISKCOPY, 146

DOS FDISK program, 153

DOS operating system, 186

DOS/Windows computer, 609

DOS-based systems, 41

double walls of security, 370

Doug Christie, 330

Dow Chemical, 546

Dr. Lee, 364

Dr. Scholl’s brand antifungal spray, 461

Dragon Sensor™, 60, 587

drive-by hackers, 597

Dsniff, 453

dual-purpose programs, 40, 83

duplication and preservation of digital evidence action agenda, 161

duplication and preservation of digital evidence conclusions, 160–61

Dutch authorities, 413

Dynamic Host Configuration Protocol (DHCP) server, 243



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net