Question

computer forensics question how would you use data about network traffic to defer attacks to the...

computer forensics question

how would you use data about network traffic to defer attacks to the network?

Homework Answers

Answer #1

Network traffic data can offer valuable insights about executable files, infected sites, advertisements, USB drives, email attachments, etc.

Such data can be used to monitor and detect suspicious data sources and files and delete them. If there are certain suspicious malicious outgoing sources, one can use data encryption and other types of protection mechanisms.

A firewall can also be used. It helps in monitoring data about incoming/outgoing traffic and setting some security rules. It helps in creating a border between internal and external networks. This helps in creating solution tools for applications, mobile apps, APIs, etc.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
How would you use data about network traffic to deter attacks to the network? This is...
How would you use data about network traffic to deter attacks to the network? This is a question based on computer forensics.
This is a question about digital forensics and how it relates to Windows file systems, specifically...
This is a question about digital forensics and how it relates to Windows file systems, specifically FAT and NTFS. How might knowledge about these two file structures (NTFS and FAT) be useful to a digital forensics examiner? How would it help them with their process? Please explain in detail. Thank you!
.a. Explain the term Security Attacks b. An active attack is a network exploit in which...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. They are quite difficult to prevent active attacks absolutely because of the wide variety of potential physical, software, and network vulnerabilities. Briefly discuss three of such attacks. c. What is an antivirus? d.As a user, you may have come across systems with antivirus installed on them...
1)This question may require some research. If a computer wants to send a broadcast message to...
1)This question may require some research. If a computer wants to send a broadcast message to all other computers on the same network, what MAC address does it put in the Destination Address field of the frame? 2)This question may require some research. In one of the videos this week we mentioned that Uplink ports have the transmit and receive connectors reversed from the regular ports. What would be the purpose for doing that? 3)Which of the following is the...
What is a “computer network”? Why are computer networks important to business? How do you see...
What is a “computer network”? Why are computer networks important to business? How do you see networks used at businesses? Did any of the uses surprise you? How were those tasks accomplished before computer networks?
1. In 2003, there were many media reports about the number of shark attacks in Florida....
1. In 2003, there were many media reports about the number of shark attacks in Florida. At the end of the year, there were a total of 30 unprovoked shark attacks. By comparison, there were 246 shark attacks over the prior ten years. Using the pre-2003 data, simulate the number of shark attacks for 2003. Based on your simulation, what is the probability that there would be 30 or more shark attacks in that year? (in python) 2. Find the...
Text sheet: Tasks Aim Higher College system administrators have requested that you review network traffic to...
Text sheet: Tasks Aim Higher College system administrators have requested that you review network traffic to determine whether the institution’s intrusion detection system (IDS) and intrusion prevention system (IPS) can be used to prevent inbound attacks that are being detected. Your manager has requested that you analyze the detected attacks and create a report that describes each attack, explains the threat it presents, and if an IDS or an IPS is suited to dealing with it. Specifically, your report should...
An intersection has a four-way stop sign but no traffic light. Currently, about 1200 cars use...
An intersection has a four-way stop sign but no traffic light. Currently, about 1200 cars use the intersection a day, and the rate of accidents at the intersection is about one every two weeks. The potential benefit of adding a traffic light was studied using a computer simulation by model- ing traffic flow at the intersection if a light were to be installed. The simulation included 100,000 repetitions of 1200 cars using the intersection to mimic 100,000 days of use....
a) An IP address is a number that uniquely identifies a device within a computer network....
a) An IP address is a number that uniquely identifies a device within a computer network. This address can be derived from a General Network Address. i. Using any network address of your choice, explain how you would generate IP addresses by subnet masking. ii. Briefly explain the concept of Host Address and Network Address.
Question: How would you scan for outliers in your dataset? What would you do with data...
Question: How would you scan for outliers in your dataset? What would you do with data points that are considered outliers?