Security and forensic computing: forensic computing.

7 FORENSIC COMPUTING 217 7.1 Introduction 217 7.2 Legal infrastructure 217 7.3 Computer Forensics 218 7.4 Is it true or not? 219 7.5 Identity details 222 7.6 One-time passwords (OTP) and two-factor authentication 223 7.7 Collection 224 7.8 Preservation 224 7.9 Event log 225 7.10 Data hiding 228 7.11 Covert channels 228 7.12 Tutorial 228 7.13 Software Tutorial 229 7.14 On-line Exercises 229 7.15 NetworkSims exercises 229 7.16 Chapter Lecture 229