NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Pay for network forensics
|
|
Prevent it from happening by doing a penetration test
|
|
Panic and tell you mam and dad
|
|
Ring parents to let them know that data has been stolen
|
Detailed explanation-1: -Today, you can expect to find hourly rates in the $200 to $450 range. A typical analysis on a single device, without any of the above complications (ie. encryption, use of forensic tools, broad scope of investigation work, etc.) will generally take 15-30 hours of work.
Detailed explanation-2: -The first phase is preparation, which makes sure security solutions such as monitors, firewalls, and IDSs have already been deployed. The second phase is detection, which identifies cyber attacks and captures network traffic, followed by the third incident response phase.
Detailed explanation-3: -The general phases of the forensic process are the identification of potential evidence, the acquisition of that evidence, analysis of the evidence, and finally production of a report.