1.4.13

Network Forensics

Test yourself

Network Forensics

Some users of a network may intentionally or unintentionally break the network policy. The network administrator must look for times when this happens.

Illustrative background for Network forensicsIllustrative background for Network forensics ?? "content

Network forensics

  • Network administrators must capture, store, and analyse network data to discover the source of security attacks and vulnerabilities.
Illustrative background for How is network forensics done?Illustrative background for How is network forensics done? ?? "content

How is network forensics done?

  • Network forensics makes use of a lot of automated software which can alert administrators to suspicious activity on the network.
  • For example, an administrator might be alerted if:
    • A password has been entered incorrectly 5 times.
    • A user has tried to install software themselves.
Illustrative background for ImprovementsIllustrative background for Improvements ?? "content

Improvements

  • After a security attack or vulnerability has been detected, the administrator will analyse what allowed the attack to happen.
  • The administrator can then make the necessary changes to the network to prevent similar attacks in the future.

Jump to other topics

1Computer Systems

1.1Systems Architecture

1.2Memory & Storage

1.3Computer Networks, Connections & Protocols

1.4Network Security

1.5Systems Software

1.6Ethical, Legal, Cultural & Environmental Concern

2Computational Thinking, Algorithms and Programming

2.1Algorithms

2.2Programming Fundamentals

2.3Producing Robust Programs

2.4Boolean Logic

2.5Programming Languages & IDEs

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium