5.2.13

Network Forensics

Test yourself on Network Forensics

Test your knowledge with free interactive questions on Seneca — used by over 10 million students.

Network Forensics

Some users of a network may intentionally or unintentionally break the network policy. The network administrator must look for times when this happens.

Network forensics

Network forensics

  • Network administrators must capture, store, and analyse network data to discover the source of security attacks and vulnerabilities.
How is network forensics done?

How is network forensics done?

  • Network forensics makes use of a lot of automated software which can alert administrators to suspicious activity on the network.
  • For example, an administrator might be alerted if:
    • A password has been entered incorrectly 5 times.
    • A user has tried to install software themselves.
Improvements

Improvements

  • After a security attack or vulnerability has been detected, the administrator will analyse what allowed the attack to happen.
  • The administrator can then make the necessary changes to the network to prevent similar attacks in the future.
Jump to other topics
1

Problem Solving

2

Programming

3

Data

4

Computers

5

Communication & The Internet

6

The Bigger Picture

Practice questions on Network Forensics

Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.

  1. 1
  2. 2
  3. 3
  4. 4
Answer all questions on Network Forensics

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium