1.4.13

Network Forensics

Test yourself

Network Forensics

Some users of a network may intentionally or unintentionally break the network policy. The network administrator must look for times when this happens.

Illustrative background for Network forensicsIllustrative background for Network forensics ?? "content

Network forensics

  • Network administrators must capture, store, and analyse network data to discover the source of security attacks and vulnerabilities.
Illustrative background for How is network forensics done?Illustrative background for How is network forensics done? ?? "content

How is network forensics done?

  • Network forensics makes use of a lot of automated software which can alert administrators to suspicious activity on the network.
  • For example, an administrator might be alerted if:
    • A password has been entered incorrectly 5 times.
    • A user has tried to install software themselves.
Illustrative background for ImprovementsIllustrative background for Improvements ?? "content

Improvements

  • After a security attack or vulnerability has been detected, the administrator will analyse what allowed the attack to happen.
  • The administrator can then make the necessary changes to the network to prevent similar attacks in the future.

Jump to other topics

1Computer Systems

1.1Systems Architecture

1.2Memory & Storage

1.3Computer Networks, Connections & Protocols

1.4Network Security

1.5Systems Software

1.6Ethical, Legal, Cultural & Environmental Concern

2Computational Thinking, Algorithms and Programming

2.1Algorithms

2.2Programming Fundamentals

2.3Producing Robust Programs

2.4Boolean Logic

2.5Programming Languages & IDEs

Go student ad image

Unlock your full potential with GoStudent tutoring

  • Affordable 1:1 tutoring from the comfort of your home

  • Tutors are matched to your specific learning needs

  • 30+ school subjects covered

Book a free trial lesson