List of Figures

Figure 1.1:     Classification of information security analysts
Figure 1.2:     Time-consuming activities for information security professionals
Figure 1.3:     Training needs identified by information security professionals
Figure 1.4:     ILOVEYOU virus
Figure 1.5:     T.J. Maxx
Figure 1.6:     Defaced Georgian foreign ministry website
Figure 1.7:     Google-China offices
Figure 1.8:     Online Software Inspector
Figure 1.9:     PC audit report
Figure 1.10:   Contents of Downloads folder for Steganography exercise
Figure 1.11:   Commands to hide text files at the end of image files
Figure 1.12:   Manipulated images among original images
Figure 1.13:   Opening image files in Notepad
Figure 1.14:   Secret message hidden at the end of the image file
Figure 1.15:   Sunshine State University funding sources
Figure 1.16:   Extract from the organization structure of Sunshine State University
Figure 2.1:     Paul Ceglia
Figure 2.2:     Windows desktop usage—April 2013
Figure 2.3:     System Center Operation Manager
Figure 2.4:     Unix family tree
Figure 2.5:     Albert Gonzalez, at the time of his indictment in August 2009
Figure 2.6:     T J Maxx sales (2005–2010)
Figure 2.7:     Virtual machine structure
Figure 2.8:     VirtualBox download page
Figure 2.9:     VirtualBox installer welcome screen
Figure 2.10:   Default install Location
Figure 2.11:   VirtualBox install confirmation
Figure 2.12:   VirtualBox ...

Get Information Security and IT Risk Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.