Information Technology Reference
In-Depth Information
case.or.audit.or.simply.record.keeping.that.you.are.doing,.you.
will.need.to.either.gain.that.expertise.yourself.or.hire.some-
one.with.those.skills.and.tools..In.the.understanding.of.where.
data. live,. do. not. neglect. this. rich. source. of. information.. In.
many.cases.it.contains.some.of.the.most.important.facts.and.
clues.to.understand.what.really.happened.on.a.computer.and.
when.and.by.whose.hand.
5.2.3 Encrypted Data
Yet. another. way. that. data. might. be. made. hard. or. impos-
sible.to.access.is.through.encryption.(FigureĀ 5.3)..There.are.
many.ways.to.encrypt.data.on.a.computer,.from.the.relatively.
simple.act.of.assigning.a.password.to.a.ile,.to.the.incredibly.
complex.process.and.management.of.digital.certiicates.that.
automatically. encrypt. data. in. e-mails,. or.speciic. folders,. or.
even.entire.hard.drives.
On.newer.Windows.operating.systems,.they.include.a.tool.
called.BitLocker..This.allows.you.to.create.speciic.encrypted.
folders.such.that.any.data.that.you.want.to.protect.can.simply.
be. stored. in. those. folders. and. a. pass. phrase. is. required. to.
access.the.data.
Figure 5.3 Encrypted.data.on.a.computer.can.be.dificult.or.impos-
sible.to.access.
Search WWH ::




Custom Search