ESSAY CONCLUSION + REFERENCE(S) - NETWORK FORENSICS

 Outcomes of a network forensic examination would basically involve a detailed analysis of a network which is proven to be authentic by the use of cryptographic hashes and a report involving the details of the security threat or the attack. A report would typically involve analysis of the collected data and the conclusion arrived from it as well. 

These reports and documentation would also be admissible in court as it would include evidence of the authenticity of the respective data/evidence.




Reference(s):

Infosecurity (2010). Network Forensics Helps Bolsters Confidence In Cloud Computing Security. [online] Infosecurity Magazine. Available at: <https://www.infosecurity-magazine.com/news/network-forensics-helps-bolsters-confidence-in/> [Accessed 9 November 2020].

LIFARS (2020). The Basics Of Network Forensics. [online] Available at: <https://lifars.com/2020/06/the-basics-of-network-forensics/> [Accessed 9 November 2020].

Messier, R., (2017). Network Forensics. Indianapolis: Wiley & Sons.

HowStuffWorks.(n.d.) What Is A Packet?. [online] Available at: <https://computer.howstuffworks.com/question525.htm> [Accessed 10 November 2020].

Techopedia (n.d.) Message Digest 5 (MD5). [online] Available at: <https://www.techopedia.com/definition/31700/message-digest-5-md5> [Accessed 10 November 2020].

Liveaction (n.d.) What Is A Network Packet?. [online] Available at: <https://www.liveaction.com/blog/network-packet/> [Accessed 10 November 2020].

Lowery, J., (2020). MD5 Vs SHA-1 Vs SHA-2 - Which Is The Most Secure Encryption Hash And How To Check Them. [online] freeCodeCamp.org. Available at: <https://www.freecodecamp.org/news/md5-vs-sha-1-vs-sha-2-which-is-the-most-secure-encryption-hash-and-how-to-check-them/> [Accessed 10 November 2020].

Ray, S., (2017). Cryptographic Hashing. [online] Hackernoon.com. Available at: <https://hackernoon.com/cryptographic-hashing-c25da23609c3> [Accessed 10 November 2020].

Porup, J., (2018). What Is Wireshark? What This Essential Tool Does And How To Use It. [online] CSO Online. Available at: <https://www.csoonline.com/article/3305805/what-is-wireshark-what-this-essential-troubleshooting-tool-does-and-how-to-use-it.html> [Accessed 10 November 2020].

Hackers-arise. (2018). Network Forensics, Wireshark Basics, Part 1. [online] Available at: <https://www.hackers-arise.com/post/2018/09/24/network-forensics-wireshark-basics-part-1#:~:text=Although%20Wireshark%20is%20the%20most,the%20field%20of%20network%20forensics.&text=Wireshark%20(formerly%20known%20as%20Ethereal,traffic%20and%20even%20individual%20packets.> [Accessed 10 November 2020].

Comments

Popular Posts