COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Examination of computers
|
|
The examination of data sent across a network
|
|
Examination of phones
|
|
The examination of computer data
|
Detailed explanation-1: -Network forensics records, stores and analyses network traffic, providing a complete record of network communications. It also provides powerful search and analysis tools to evaluate traffic and obtain critical information that’s been stored.
Detailed explanation-2: -Network forensics is necessary in order to determine the type of attack over a network and to trace the culprit. A proper investigation process is required to produce the evidence recovered during the investigation in the court of law.
Detailed explanation-3: -A generic network forensic examination includes the following steps: Identification, preservation, collection, examination, analysis, presentation and Incident Response.
Detailed explanation-4: -Some of the key challenges include high storage speed, the requirement of ample storage space, data integrity, data privacy, access to IP address, and location of data extraction. The details concerning these challenges are provided with potential solutions to these challenges.