electromagnetic emanations – expert opinion evidence 467
HIPAA and, 35
keys, 53, 56, 58, 72, 85, 207, 424
link encryption, 248
messages, 428
protocols, 299
R A DI US, 119
risk metrics, 243
social media traffic and, 153
software export, 319
SSD drives, 343
steganography, 62– 63
symmetric, 278, 337
thumb drives, 46
endpoint systems, 98, 99, 355, 356
enrollment, 435
entitlement, 385
erasing media, 37, 171, 331, 333
ERP systems, permissions, 152
error messages, 177
ESP (Encapsulating Security Payload), 340
Transport mode, 431
espionage, 386
Ethernet
cabling, 222
CSMA/CD (Carrier-Sense Multiple
Access with Collision Detection), 355
topology, 101
EU (European Union)
privacy shield agreements with US, 3
EU GDPR (General Data Protection
Regulation), 3, 40, 43, 46, 312–313,
442, 457
EU-U.S. Privacy Shield Framework, 208,
218, 319, 408, 413
evidence, 153, 217, 238, 381, 384, 435
admissibility, 158, 388
courts and, 166
direct, 390
expert opinion, 390
parol evidence rule, 412
preservation, 170
evil twin attacks, 2, 318
excessive privileges, 114
expert opinion evidence, 390
electromagnetic emanations, 68, 72
capacitance motion detectors, 345
Faraday cage, 345
Electronic Communications Privacy Act, 442
electronic discovery reference model, 220–221
electronic signatures, 332
electronic vaulting, 322, 387
elevation of privilege attack, 319
email, 85
attachments, 92
confidentiality, 281, 297
encryption, 314
pass-around reviews, 438
security requirements, 45
web of trust approach, 457
embedded data, file ownership and, 48
emergency response, 15, 323, 427
components, 248
EMI (electromagnetic interference), 453
Encapsulating Security Payload, 449
encapsulation, 290, 414, 439, 445
Encrypting File System (Microsoft), 35
encryption, 30, 49, 324, 327, 332, 335, 408,
421, 424
accessing information, 55
AES (Advanced Encryption Standard),
312, 332
algorithms, 59, 66, 69–71, 250
asymmetric cryptosystems, 55–56
bcrypt, 41, 334
BitLocker, 33, 35
Bluetooth, 356
Caesar cipher, 63
CCMP (Counter Mode Cipher Block
Chaining Message Authentication
Mode Protocol), 97
cellular networks, 455
data at rest, 48, 223
data in transit, 223
decryption, 56, 252
email, 314
Encrypting File System (Microsoft), 35
frequency analysis, 69
full disk, 33, 330