Skip to main content

Research Repository

Advanced Search

Security and forensic computing: forensic computing.

Buchanan, William J

Authors



Abstract

7 FORENSIC COMPUTING 217
7.1 Introduction 217
7.2 Legal infrastructure 217
7.3 Computer Forensics 218
7.4 Is it true or not? 219
7.5 Identity details 222
7.6 One-time passwords (OTP) and two-factor authentication 223
7.7 Collection 224
7.8 Preservation 224
7.9 Event log 225
7.10 Data hiding 228
7.11 Covert channels 228
7.12 Tutorial 228
7.13 Software Tutorial 229
7.14 On-line Exercises 229
7.15 NetworkSims exercises 229
7.16 Chapter Lecture 229

Publication Date 2011
Deposit Date Jan 11, 2011
Publicly Available Date Dec 31, 2011
Peer Reviewed Not Peer Reviewed
Keywords Data security; forensic computing; covert channels; newtork logs; incident detection; analysis;
Public URL http://researchrepository.napier.ac.uk/id/eprint/4064
Contract Date Jan 11, 2011

Files








You might also like



Downloadable Citations