O'Reilly logo

Computer Forensics JumpStart, Second Edition by Diane Barrett, Neil Broom, Ed Tittel, K Rudolph, Michael G. Solomon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Passwords

user ID

A string of characters that identifies a user in a computing environment.

Computer users must commonly provide a user ID to log on to, or otherwise access, a system. User IDs identify a specific user and tell the security subsystem what permissions to grant to that user. Unfortunately, some computer users attempt to impersonate other users by fraudulently providing another person’s user ID. By doing so, the impersonator can perform actions that will point back to the stolen user ID owner’s account when audited. As a forensic investigator, you’ll need to determine the difference between actions taken using a valid user ID and actions conducted by an impersonator using a stolen or otherwise compromised user ID.

Who Are You, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required