O'Reilly logo

Practical Digital Forensics by Richard Boddington

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Explaining password security, encryption, and hidden files

The following sections describe password security and encryption and ways to protect information and conceal evidence from prying eyes. They outline the basic processes of managing the security of computer devices and networks as well as describing the reasons why digital information needs protection from a wide range of threats.

User access to computer devices

To protect data stored on a device from unauthorized access, user access controls offer some degree of protection. This applies to desktops, laptops, mobile phones and other handheld devices, home security systems, and a broad range of other electronic equipment. Not only is it essential to restrict direct human access to information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required