Successfully reported this slideshow. Show Your SlideShare is downloading. ×
More Related Content
What are the three modes of protection in the DiD strategy?strategy. It focuses on three modes of protection: people, technology, and operations.
What is meant by network forensics?Network forensics can be generally defined as a science of discovering and retrieving evidential information in a networked environment about a crime in such a way as to make it admissible in court.
What are the three main steps in the network forensic process and why?Acquisition (without altering or damaging), Authentication (that recovered evidence is the exact copy of the original data), and Analysis (without modifying) are the three main steps of computer forensic investigations.
What are the methods of network forensics?There are two methods of network forensics:. “Catch it as you can” method: All network traffic is captured. ... . “Stop, look and listen” method: Administrators watch each data packet that flows across the network but they capture only what is considered suspicious and deserving of an in-depth analysis.. |