FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Network forensics primarily involves (1-3)
A
Examination of computers
B
The examination of data sent across a network
C
Examination of phones
D
The examination of computer data
Explanation: 

Detailed explanation-1: -Network forensics records, stores and analyses network traffic, providing a complete record of network communications. It also provides powerful search and analysis tools to evaluate traffic and obtain critical information that’s been stored.

Detailed explanation-2: -Network forensics is necessary in order to determine the type of attack over a network and to trace the culprit. A proper investigation process is required to produce the evidence recovered during the investigation in the court of law.

Detailed explanation-3: -A generic network forensic examination includes the following steps: Identification, preservation, collection, examination, analysis, presentation and Incident Response.

Detailed explanation-4: -Some of the key challenges include high storage speed, the requirement of ample storage space, data integrity, data privacy, access to IP address, and location of data extraction. The details concerning these challenges are provided with potential solutions to these challenges.

There is 1 question to complete.