Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
7 FORENSIC COMPUTING 217
7.1 Introduction 217
7.2 Legal infrastructure 217
7.3 Computer Forensics 218
7.4 Is it true or not? 219
7.5 Identity details 222
7.6 One-time passwords (OTP) and two-factor authentication 223
7.7 Collection 224
7.8 Preservation 224
7.9 Event log 225
7.10 Data hiding 228
7.11 Covert channels 228
7.12 Tutorial 228
7.13 Software Tutorial 229
7.14 On-line Exercises 229
7.15 NetworkSims exercises 229
7.16 Chapter Lecture 229
Publication Date | 2011 |
---|---|
Deposit Date | Jan 11, 2011 |
Publicly Available Date | Dec 31, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Data security; forensic computing; covert channels; newtork logs; incident detection; analysis; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4064 |
Contract Date | Jan 11, 2011 |
unit08_forensic_computing.pdf
(21.4 Mb)
PDF
sfc_unit07.html
(557 bytes)
Other
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode
(2024)
Presentation / Conference Contribution
Detection of Ransomware
(2024)
Patent
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis
(2024)
Presentation / Conference Contribution
Application of Randomness for Security and Privacy in Multi-Party Computation
(2024)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search