0
2.5kviews
How do you secure a network using network forensics?

Subject: Digital Forensics

Topic: Network Forensics

Difficulty: Medium

1 Answer
0
94views

Network forensics is the process of collecting and analyzing raw network data and tracking network traffic systematically to ascertain how an attack was carried out or how an event occurred on a network.

• Being able to spot variations in network traffic can help you track intrusions, so knowing your network’s typical traffic patterns is important.

• Network forensics can also help you determine whether a network is truly under attack or a user has inadvertently installed an untested patch or custom program.

• Network forensics examiners must establish standard procedures for how to acquire data after an attack or intrusion incident.

SECURING A NETWORK

• Network forensics is used to determine how a security breach occurred; however, steps must be taken to harden networks before a security breach happens.

• Layered network defense strategy, which sets up layers of protection to hide the most valuable data at the innermost part of the network.

• It also ensures that the deeper into the network an attacker gets, the more difficult access becomes and the more safeguards are in place.

• The National Security Agency (NSA) developed an approach, called the defense in depth (DiD) strategy.

Please log in to add an answer.