Question

computer forensics question how would you use data about network traffic to defer attacks to the...

computer forensics question

how would you use data about network traffic to defer attacks to the network?

Homework Answers

Answer #1

Network traffic data can offer valuable insights about executable files, infected sites, advertisements, USB drives, email attachments, etc.

Such data can be used to monitor and detect suspicious data sources and files and delete them. If there are certain suspicious malicious outgoing sources, one can use data encryption and other types of protection mechanisms.

A firewall can also be used. It helps in monitoring data about incoming/outgoing traffic and setting some security rules. It helps in creating a border between internal and external networks. This helps in creating solution tools for applications, mobile apps, APIs, etc.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
How would you use data about network traffic to deter attacks to the network? This is...
How would you use data about network traffic to deter attacks to the network? This is a question based on computer forensics.
This is a question about digital forensics and how it relates to Windows file systems, specifically...
This is a question about digital forensics and how it relates to Windows file systems, specifically FAT and NTFS. How might knowledge about these two file structures (NTFS and FAT) be useful to a digital forensics examiner? How would it help them with their process? Please explain in detail. Thank you!
.a. Explain the term Security Attacks b. An active attack is a network exploit in which...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. They are quite difficult to prevent active attacks absolutely because of the wide variety of potential physical, software, and network vulnerabilities. Briefly discuss three of such attacks. c. What is an antivirus? d.As a user, you may have come across systems with antivirus installed on them...
1)This question may require some research. If a computer wants to send a broadcast message to...
1)This question may require some research. If a computer wants to send a broadcast message to all other computers on the same network, what MAC address does it put in the Destination Address field of the frame? 2)This question may require some research. In one of the videos this week we mentioned that Uplink ports have the transmit and receive connectors reversed from the regular ports. What would be the purpose for doing that? 3)Which of the following is the...
1. In 2003, there were many media reports about the number of shark attacks in Florida....
1. In 2003, there were many media reports about the number of shark attacks in Florida. At the end of the year, there were a total of 30 unprovoked shark attacks. By comparison, there were 246 shark attacks over the prior ten years. Using the pre-2003 data, simulate the number of shark attacks for 2003. Based on your simulation, what is the probability that there would be 30 or more shark attacks in that year? (in python) 2. Find the...
a) An IP address is a number that uniquely identifies a device within a computer network....
a) An IP address is a number that uniquely identifies a device within a computer network. This address can be derived from a General Network Address. i. Using any network address of your choice, explain how you would generate IP addresses by subnet masking. ii. Briefly explain the concept of Host Address and Network Address.
Question: How would you scan for outliers in your dataset? What would you do with data...
Question: How would you scan for outliers in your dataset? What would you do with data points that are considered outliers?
Can you draw a network diagram for this? In VISO would be an extra bonus There...
Can you draw a network diagram for this? In VISO would be an extra bonus There are two available rooms, named RH230 and RH231, in your building. You are asked to set up a server room in RH230 and a computer lab in RH231. Design a Local area network that satisfies the following conditions.  You have two 8-port switches.  Cables as you need.  Four server machines in RH230: Gateway server, DNS server, DHCP server, and Web server....
QUESTION : Case Study – Network Design Suppose that you are working as part of a...
QUESTION : Case Study – Network Design Suppose that you are working as part of a team designing a network for XYZ high school. Consider that the school has six departments, Admin, Academic, Human Resource (HR), Finance, IT support and Sports. 1. Analyse the project hardware requirements along with the number of devices and cost. 2. Justify the approach you would be taking to design the network for the school. 3. Using the network simulator (such as packet tracer) design...
Question 2 Vehicles are fast becoming another important source of digital evidence in a criminal investigation....
Question 2 Vehicles are fast becoming another important source of digital evidence in a criminal investigation. Traditionally, when a vehicle is involved in a crime scene (e.g. drink driving) or a terrorist attack, the investigators focus on the acquisition of DNA, fingerprints and other identifying materials that are usually non-digital in nature. However, modern-day cars, particularly smart or driverless cars, store a wealth of digital information. Vehicle forensics, therefore, is a valuable source of digital forensics data. Assume that you...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT