Table of Contents
Introduction
- Cyber Threat, 7 Principles of IA, Digital Forensics
Digital Data
- Binary, Hex, ASCII, Raw Data v. Compressed Data
Disks
- Disk Geometry, Logical Areas of a Disk, Disk Formatting, RAID
Computer Hardware
- Motherboard, CPU, Memory, BIOS, I/O, Storage Devices
Operating Systems
- Functions, Processes and Resources, File Systems, Booting, Windows, Mac OS X, Linux
Forensics
- Forensics Procedures, Data Acquisition, Evidence Analysis, Network Forensics, Web & Artifacts, Email & Artifacts, P2P & Artifacts
Virtual Environments
- Virtual Machines, Remote Desktops
- Network Devices, Network Cabling, Wireless, Network Topologies, Network Addressing, DCHP, OSI Model
Data Protection/Privacy
- PKI, VPN
Authentication
- Password Protection, Password Cracking, Rainbow Tables
Data Confidentiality
- Encryption, Steganography, Hashing
This article is issued from Wikibooks. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.