Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Types of Computer Forensics Technology
Figure 2.1: CFX-2000 schematic. (
©Copyright 2002, Associated Business Publications. All rights reserved
).
Chapter 4: Data Recovery
Figure 4.1: A back-up using a shared tape library.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.2: A serverless back-up system.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.3: A LAN-less back-up using remote tape server.
(©Copyright 2002, StorNet. All rights reserved).
Figure 4.4: A storage area network using serverless back-up.
(©Copyright 2002, StorNet. All rights reserved).
Chapter 7: Computer Image Verification and Authentication
Figure 7.1: Security warning screen.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.2: Client application security warning.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.3: Inspect the certificate and verify its validity.
(©Copyright 2002. VeriSign. All rights reserved).
Figure 7.4: Authenticode—VeriSign® Digital IDs Process.
(©Copyright 2002. VeriSign. All rights reserved).
Chapter 19: Advanced Computer Forensics
Figure 19.1: In public-key encryption [top], Alice encrypts a message using Bob’s public key, and Bob decrypts it using his private key. This scheme allows encrypted files to be sent in the absence of a secure means to exchange keys, a major improvement over symmetric encryption. It’s still possible, though, for Alice to receive a public key (or a conventional symmetric key) that ostensibly came from Bob, but that, in fact, belongs to a third party claiming to be Bob—the so-called man-in-the-middle attack (bottom).
(©Copyright 2002. IEEE. All rights reserved).
Figure 19.2: Public key encryption allows Alice to verify that a message from Bob actually came from him and that it is unaltered from the original. Here’s how: Bob encrypts the hash value with his private key; encrypts the plaintext with Alice’s (green) public key; and sends both to her. Alice then decodes the received ciphertext using her own [orange] private key; decodes the hash value using Bob’s public key, thereby confirming the sender’s authenticity; and compares the decrypted hash value with one that she calculates locally on the just decrypted plaintext, thereby confirming the message’s integrity.
(©Copyright 2002. IEEE. All rights reserved).
Chapter 20: Summary, Conclusions, and Recommendations
Figure 20.1: A joint CSI/FBI study determined that an overwhelming number of desktop attacks (81%) came from disgruntled employees.
(©Copyright 2002. Computer Security Institute. All rights reserved).
Figure 20.2: The 2000 CSI/FBI study totals losses incurred from data loss, fraud, or abuse for 273 respondents at $265,589,940.
(©Copyright 2002. Computer Security Institute. All rights reserved).
< Day Day Up >
Previous page
Table of content
Next page
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors:
John R. Vacca
BUY ON AMAZON
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Introduction
Using Arrays
Introduction
Implementing the Trapezoidal Rule in VBA
Determining Monthly Payments
The Complete Cisco VPN Configuration Guide
VPN Definition
Troubleshooting Problems
Microsoft Client Connections
Summary
Summary
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Organizational change
Leading change
Restructuring
Cultural change
Cisco Voice Gateways and Gatekeepers
Deployment Scenarios
Call Flow
Review Questions
Call Admission Control
.NET-A Complete Development Cycle
Our First .NET Application
The Photo Editor Application
GDI+ Programming
Unit Tests
Software Maintenance
Python Programming for the Absolute Beginner, 3rd Edition
Program Exits
Configuring Widget Appearance
Message and Entry
Data Structures Versus Python Built-ins
Part V: Integration
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies