Cargando…

Data hiding techniques in Windows OS : a practical approach to investigation and defense /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Hassan, Nihad Ahmad (Autor), Hijazi, Rami (Autor)
Otros Autores: Salminen, Helvi (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Syngress, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Machine generated contents note: 1. Introduction and Historical Background
  • Introduction
  • Classical Cipher Types
  • Substitution Cipher
  • Transposition Cipher
  • Other Ciphers and Codes
  • Difference Between Substitution and Transposition Cipher
  • Practicing Old Ciphers Using Modem Computing
  • Modern Cryptography Systems
  • Secret Key Cryptography
  • Public Key Cryptography
  • Digital Signature
  • Cryptographic Hash Function
  • Steganography
  • What Is Steganography?
  • Comparing Steganography and Cryptography
  • Steganography Types
  • Watermarking
  • Watermarking Types
  • Compare Steganography and Watermarking
  • Anonymity
  • Summary
  • References
  • Bibliography
  • 2. Data Hiding Using Simple Methods
  • Introduction
  • Bit-Shifting Data Hiding
  • Hiding Data Inside Rich Text Format Documents
  • Renaming Files
  • Matching File Signatures and File Extensions
  • Hiding Data in Compressed Files
  • Hiding Data Through File Splitting
  • Hiding Data in Microsoft® Office Documents
  • Hidden Text
  • Hidden Data Within Document Attributes (Metadata)
  • White Font
  • Hiding Data by Exploiting OLE Structured Storage
  • Self-Encrypt MS Office® Document
  • Hiding Inside MS Excel® Spreadsheet
  • Data Hiding Inside Image Attributes (Image Metadata)
  • Summary
  • References
  • Bibliography
  • 3. Data Hiding Using Steganographic Techniques
  • Introduction
  • Text Steganography
  • Format-Based Steganography
  • Random and Statistical Generation
  • Linguistic-Based Methods
  • Hiding Inside MS Office® Documents Based on OOXML File Format
  • Webpage Text Steganography
  • Hiding Secret Messages Inside Twitter Updates
  • Image Steganography
  • Digital Image Basic Concepts
  • Image Steganographic Techniques
  • Digital Media Steganography Tools
  • Data Hiding Inside Audio Files
  • Audio Files Basic Concepts
  • Audio Steganography Types
  • Data Hiding Using Other Digital Media Types
  • Data Hiding Inside PDF Documents
  • Data Hiding Inside Program Binaries
  • Summary
  • References
  • Bibliography
  • 4. Data Hiding Under Windows® OS File Structure
  • Introduction
  • Data Hiding Using Alternate Data Stream
  • What Is the New Technology File System?
  • What Is an Alternate Data Stream?
  • How Can We Use Alternate Data Streams to Hide Files?
  • Hiding Executable Code in Alternate Data Stream Files
  • Important Notes About Using Alternate Data Stream in Hiding Files
  • How to Delete Alternate Data Stream Files
  • Detecting Alternate Data Stream Files
  • Data Hiding Using Stealth Alternate Data Stream
  • Hiding Data Inside Windows® Restoration Points
  • Hiding Data Inside Windows® Registry
  • Hiding in a File's Slack Space
  • Understanding Hard Disk Drives
  • File Allocation Table
  • Hidden Partitions
  • Hidden Partitions Under Windows® OS
  • Creating a Hidden Partition Within a USB Zip Drive
  • Data Hiding Within Master File Table
  • Data Hiding in Disk Bad Blocks
  • Data Hiding Under Computer Hardware Level
  • Data Hiding Inside Host Protected Area
  • Hiding Data in Device Configuration Overlay
  • Summary
  • References
  • Bibliography
  • 5. Data Hiding Using Encryption Techniques
  • Introduction
  • Security Awareness Corners
  • Human Security
  • Device Security
  • Message Security
  • Network Security
  • Anonymous Operating System
  • Tails
  • Ubuntu Privacy Remix
  • Other Security Distributions
  • Advice When Using Security Operating Systems
  • Portable Stick Computer
  • Disk Encryption
  • Encrypting Partitions Using BitLocker
  • Creating Encrypted Vaults
  • Single File Encryption
  • Cloud Storage Encryption
  • Discussion of Security Level in Disk Encryption
  • Anonymize Your Location Online
  • Using the TOR Browser
  • Virtual Private Networks
  • SSH Tunneling
  • Using Proxy Server
  • Anonymous Search Engine
  • Web Browser Privacy Add-Ons
  • Secure Anonymous File Sharing
  • Encrypting Email Communications
  • Email Encryption Using Gpg4Win
  • Open PGP Encryption for Webmail Using the Mailvelope Browser Extension
  • Secure Web Mail Providers
  • Encrypt Instant Messaging, Video Calls, and VOIP Sessions
  • What Are the Risks?
  • Off-the-Record-Messaging and Pidgin
  • Secure Video Calling Service Using Gruveo
  • Secure Anonymous Calling Service Using GHOST CALL
  • Retroshare Secure Social Platform
  • TOR Messenger
  • Complete Anonymous IM Using Ricochet
  • Create and Maintain Secure Passwords
  • Password Best Practice
  • Password Generation Tools
  • Password-Saving Techniques
  • Password Manager Tools
  • Miscellaneous Security Hints and Best Practices
  • Summary
  • References
  • Bibliography
  • 6. Data Hiding Forensics
  • Introduction
  • Understanding Computer Forensics
  • Computer Forensic Process
  • Differences Between Computer Forensics and Other Computing Domains
  • Need for Digital Evidence
  • Steganalysis
  • Steganalysis Methods
  • Destroying Hidden Data
  • Steganalysis of Digital Media Files
  • Text Document Steganalysis
  • Image Forensics
  • Audio Forensics
  • Video Forensics
  • Digital Files Metadata Forensic
  • Windows Forensics
  • Capture Volatile Memory
  • Capture Disk Drive
  • Deleted Files Recovery
  • Windows Registry Analysis
  • Forensic Analysis of Windows Prefetch Files
  • Windows Minidump Files Forensics
  • Windows Thumbnail Forensics
  • File Signature Analysis
  • File Attributes Analysis
  • Discover Hidden Partitions
  • Detect Alternative Data Streams
  • Investigating Windows Volume Shadow Copy
  • Virtual Memory Analysis
  • Windows Password Cracking
  • Host Protected Area and Device Configuration Relay Forensic
  • Examining Encrypted Files
  • Summary
  • References
  • Bibliography
  • 7. Antiforensic Techniques
  • Introduction
  • Antiforensics Goals
  • Data Hiding General Advice
  • Data Destruction
  • Hard Disk Wiping
  • Manipulating Digital File Metadata
  • Windows Antiforensics Techniques
  • Configure Windows for Better Privacy
  • Disable Recycle Bin
  • Registry Antiforensics
  • Disable Windows Hibernation
  • Disable Windows Virtual Memory (Paging File)
  • Disable System Restore Points and File History
  • Disable Windows Thumbnail Cache
  • Disable Windows Prefetch Feature
  • Disable Windows Logging
  • Disable Windows® Password Hash Extraction
  • Clearing Digital Footprints
  • Live CDs and Bootable USB Tokens
  • Virtual Machines
  • Using Portable Applications
  • Direct Attack Against Forensic Software
  • Summary
  • References
  • Bibliography
  • 8. Future Trends
  • Introduction
  • Future of Encryption
  • Data Stored in Cloud Computing
  • Visualization Technology
  • Data Hiding in Enterprise Networks
  • Data Concealment
  • Data Leakage Prevention
  • Streaming Protocols
  • Wireless Networks and Future Networking Protocols
  • Data Hiding in Mobile Devices
  • Anonymous Networks
  • Summary
  • References
  • Bibliography.