1.4.13

Network Forensics

Test yourself on Network Forensics

Test your knowledge with free interactive questions on Seneca — used by over 10 million students.

Network Forensics

Some users of a network may intentionally or unintentionally break the network policy. The network administrator must look for times when this happens.

Network forensics

Network forensics

  • Network administrators must capture, store, and analyse network data to discover the source of security attacks and vulnerabilities.
How is network forensics done?

How is network forensics done?

  • Network forensics makes use of a lot of automated software which can alert administrators to suspicious activity on the network.
  • For example, an administrator might be alerted if:
    • A password has been entered incorrectly 5 times.
    • A user has tried to install software themselves.
Improvements

Improvements

  • After a security attack or vulnerability has been detected, the administrator will analyse what allowed the attack to happen.
  • The administrator can then make the necessary changes to the network to prevent similar attacks in the future.
Jump to other topics
1

Computer Systems

1.1

Systems Architecture

1.2

Memory & Storage

1.3

Computer Networks, Connections & Protocols

1.4

Network Security

1.5

Systems Software

1.6

Ethical, Legal, Cultural & Environmental Concern

2

Computational Thinking, Algorithms & Programming

2.1

Algorithms

2.2

Programming Fundamentals

2.3

Producing Robust Programs

2.4

Boolean Logic

2.5

Programming Languages & IDEs

Practice questions on Network Forensics

Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.

  1. 1
  2. 2
  3. 3
  4. 4
Answer all questions on Network Forensics

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium