Question

How would you use data about network traffic to deter attacks to the network? This is...

How would you use data about network traffic to deter attacks to the network? This is a question based on computer forensics.

Homework Answers

Answer #1

Data about network traffic can be used for performing Network Traffic Analysis .

NETWORK TRAFFIC ANALYSIS(NTA)

NTA determine network threats by analysing threats on the network level. So a specialist can detect threat and isolate the threat efficiently at the early stage and keep the network secure.

The features of NTA are:

  • NTA system analyses a network in all the directions so that non of a suspicious action is unnoticed.
  • The threat is detected by NTA system by using a combination of tools including machine learning, compromise indicators, behaviour analysis etc. So that an attack can be detected even after the attacker gain access to the network.
  • NTA system also can ve used to investigate on previous attacks by some hypothesis which helps to isolate the flaw and make the network more secure.

NTA also helps to ensure that the network met the security guidlines. It detects attacks inside a network and also in a network perimeters.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
computer forensics question how would you use data about network traffic to defer attacks to the...
computer forensics question how would you use data about network traffic to defer attacks to the network?
.a. Explain the term Security Attacks b. An active attack is a network exploit in which...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. They are quite difficult to prevent active attacks absolutely because of the wide variety of potential physical, software, and network vulnerabilities. Briefly discuss three of such attacks. c. What is an antivirus? d.As a user, you may have come across systems with antivirus installed on them...
1. In 2003, there were many media reports about the number of shark attacks in Florida....
1. In 2003, there were many media reports about the number of shark attacks in Florida. At the end of the year, there were a total of 30 unprovoked shark attacks. By comparison, there were 246 shark attacks over the prior ten years. Using the pre-2003 data, simulate the number of shark attacks for 2003. Based on your simulation, what is the probability that there would be 30 or more shark attacks in that year? (in python) 2. Find the...
An online site presented this? question, "Would the recent norovirus outbreak deter you from taking a?...
An online site presented this? question, "Would the recent norovirus outbreak deter you from taking a? cruise?" Among the 34,577 people who? responded,64?% answered?"yes." Use the sample data to construct a 95?% confidence interval estimate for the proportion of the population of all people who would respond? "yes" to that question. Does the confidence interval provide a good estimate of the population? proportion?
1.) An online site presented this​ question, "Would the recent norovirus outbreak deter you from taking...
1.) An online site presented this​ question, "Would the recent norovirus outbreak deter you from taking a​ cruise?" Among the 34,705 people who​ responded, 69​% answered​ "yes." Use the sample data to construct a 90​% confidence interval estimate for the proportion of the population of all people who would respond​ "yes" to that question. Does the confidence interval provide a good estimate of the population​ proportion? ______<p<______
This is a question about digital forensics and how it relates to Windows file systems, specifically...
This is a question about digital forensics and how it relates to Windows file systems, specifically FAT and NTFS. How might knowledge about these two file structures (NTFS and FAT) be useful to a digital forensics examiner? How would it help them with their process? Please explain in detail. Thank you!
1)This question may require some research. If a computer wants to send a broadcast message to...
1)This question may require some research. If a computer wants to send a broadcast message to all other computers on the same network, what MAC address does it put in the Destination Address field of the frame? 2)This question may require some research. In one of the videos this week we mentioned that Uplink ports have the transmit and receive connectors reversed from the regular ports. What would be the purpose for doing that? 3)Which of the following is the...
Can you draw a network diagram for this? In VISO would be an extra bonus There...
Can you draw a network diagram for this? In VISO would be an extra bonus There are two available rooms, named RH230 and RH231, in your building. You are asked to set up a server room in RH230 and a computer lab in RH231. Design a Local area network that satisfies the following conditions.  You have two 8-port switches.  Cables as you need.  Four server machines in RH230: Gateway server, DNS server, DHCP server, and Web server....
You are the WAN engineer for Widgets International. Your company has just purchased the IP network...
You are the WAN engineer for Widgets International. Your company has just purchased the IP network range 201.144.32.0/24. Your company needs two networks with 48 hosts per network using this IP network range. How do you subnet this IP network? What is the subnet mask you should use? What network address would you use? How would you write this in CIDR notation? What are the usable networks and ranges that you can use to accomplish your company s directive?
Question: How would you scan for outliers in your dataset? What would you do with data...
Question: How would you scan for outliers in your dataset? What would you do with data points that are considered outliers?
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT