INSPIRING FUTURES

Security and forensic computing: forensic computing.

Buchanan, William J (2011) Security and forensic computing: forensic computing. [Video]

[img] HTML
sfc_unit07.html

Download (557B)
[img]
Preview
PDF
unit08_forensic_computing.pdf

Download (21MB)

Abstract/Description

7 FORENSIC COMPUTING 217
7.1 Introduction 217
7.2 Legal infrastructure 217
7.3 Computer Forensics 218
7.4 Is it true or not? 219
7.5 Identity details 222
7.6 One-time passwords (OTP) and two-factor authentication 223
7.7 Collection 224
7.8 Preservation 224
7.9 Event log 225
7.10 Data hiding 228
7.11 Covert channels 228
7.12 Tutorial 228
7.13 Software Tutorial 229
7.14 On-line Exercises 229
7.15 NetworkSims exercises 229
7.16 Chapter Lecture 229

Item Type: Video
Uncontrolled Keywords: Data security; forensic computing; covert channels; newtork logs; incident detection; analysis;
University Divisions/Research Centres: Faculty of Engineering, Computing and Creative Industries > School of Computing
Dewey Decimal Subjects: 000 Computer science, information & general works >
000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security
Library of Congress Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Item ID: 4064
Depositing User: Professor Bill Buchanan
Date Deposited: 11 Jan 2011 13:39
Last Modified: 12 Jul 2012 08:27
URI: http://researchrepository.napier.ac.uk/id/eprint/4064

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

Edinburgh Napier University is a registered Scottish charity. Registration number SC018373