Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption. Access >>>
Table of contents
- Windows Registry evidence
- TrueCrypt boot-loader
- TrueCrypt hidden volume
Premium Content for Free.
More Premium Content Accessible For Free
Open Information Security Management Maturity Model (O-ISM3)
Organizations in different business sectors and countries have different business requirements and risk tolerances. The O-ISM3 framework helps ...
CW+ Open Group: The Open Group Architecture Framework (TOGAF™ 9) and the US DoD
This White Paper provides a comparative analysis of the two frameworks that describes where DoDAF products can be employed throughout the TOGAF ADM ...
Open Group: FAIR -ISO/IEC 27005 Cookbook
This document discusses the different purposes of the two standards, how to reconcile the two with regard to terminology and process, and combine the...