Itt 375 acquiring

.docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

375

Subject

Information Systems

Date

May 14, 2024

Type

docx

Pages

4

Uploaded by irijah on coursehero.com

Running head: [SHORTENED TITLE UP TO 50 CHARACTERS] 1 Grand Canyon university Itt 375 IRIJAH Williams 05/05/2024
[SHORTENED TITLE UP TO 50 CHARACTERS] 2 For network forensics the methods of them is broken into 2 methods. Those being Catch it as you can method which means all network traffic is captured. The second one being the stop look and listen method. That method is where administrators can watch when each data packet that flows across the network but they will capture only what is considered suspicious and deserving of an in depth analysis. The methods used for logs would be called the log analysis method and that is the process of reviewing computer generated event logs to identify bugs, security threats or any other risks. It can also be used to ensure compliance with all regulations or even review the users behavior. Steganograohy is a technique or method used for databases and is used to conceal data within any day file, context, or data stream. The method that is used for analysis in digital evidence would be the autopsy and the graphical interface that is for investigators for them to use to get a better understanding on what happened on a phone or computer. It seems to be an end to end solution that is out of the box. The data hiding technique is used for the invisible data digital evidence and includes hiding entire partitions, changing file extensions, setting file attributes to hidden, but shifting, using encryption and setting up password protection. The proper steps for handling network forensics would be to capture data. Which is the capturing network packets and data using tools such as packet sniffers or any network montoring software. Then step 2 data preservation which will ensure the integrity and authenticity of the captured data is crucial. Step 3 would be to analyze and finally step 4 would be to have proper reporting. The proper way of handling logs would be to plan out security use cases in advance. Then store data for the appropriate amount of time. After that you centralize logs for improved access and security. Then you should include context in the log messages. Then apply access control. Finally leverage the cloud for added scalability and flexibility. Proper methods for
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help