Digital Evidence and Computer Crime, Second Edition

O

Objectivity, 116

Obscenity, 45–50

Obscene Publications Act, 1959, 66

Offenders:

action, inaction and reaction, 133

choice of weapon, 132

modus operandi, 116, 129, 588

behavior purposes, 150

computer and Internet technologies, 147

motive, computer and Internet technologies, 147

using network to approach and control a victim, 132

and victim relationships, 127

Online:

anonymity and self-protection, 495–503

currency, 503

databases, 493–4

dating sites, 561

investigations, dangers of, 496

sexual offenders, 415, 572

concealment techniques, 573–4

investigating, 574–9

Ontrack, Easy-Recovery Pro, 267

Open computer systems, 12, 21

OPEN Firmware, 197

Open System Interconnection (OSI):

ASN.1, 377

layers, simplified depiction of, 373

Open System Interconnection reference model, 372–3

application layer, 378–9

network and transport layers, 375–3

physical and data-link layers, 373–4

presentation layer, 377

session layer, 376–7

synopsis of, 379

OpenBoot PROM (OBP) firmware, 197

OpenBSD, 289, 428

Operating System (OS)

finger-prints, 406

Logs, 464

Operation Long Arm, 26

Opportunistic behavior of offenders, 157

Orchid Club, 171

Organization and search of evidence, 108

Organizationally Unique Identifier (OUI), 424

Origination information for calls, 388

Other Known Files, 641

Outlook Express, 282

Overwritten data, 205

Категории