Skip to main content

Research Repository

Advanced Search

Security and forensic computing: forensic computing.

Buchanan, William J

Authors



Abstract

7 FORENSIC COMPUTING 217
7.1 Introduction 217
7.2 Legal infrastructure 217
7.3 Computer Forensics 218
7.4 Is it true or not? 219
7.5 Identity details 222
7.6 One-time passwords (OTP) and two-factor authentication 223
7.7 Collection 224
7.8 Preservation 224
7.9 Event log 225
7.10 Data hiding 228
7.11 Covert channels 228
7.12 Tutorial 228
7.13 Software Tutorial 229
7.14 On-line Exercises 229
7.15 NetworkSims exercises 229
7.16 Chapter Lecture 229

Citation

Buchanan, W. J. (2011). Security and forensic computing: forensic computing

Publication Date 2011
Deposit Date Jan 11, 2011
Publicly Available Date Dec 31, 2011
Peer Reviewed Not Peer Reviewed
Keywords Data security; forensic computing; covert channels; newtork logs; incident detection; analysis;
Public URL http://researchrepository.napier.ac.uk/id/eprint/4064

Files

sfc_unit07.html (<nobr>557 bytes</nobr>)
Other








You might also like



Downloadable Citations