issc 456 discussion response 2

nhs fp5004 assessment 3 leadership self assessment 1
October 7, 2021
600 words on process for effective delegation
October 7, 2021

issc 456 discussion response 2

Hello,

I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

Find a video that shows how to perform a specific network forensics process, summarize the video, and attach it to your discussion. As an investigator, why do you need to know how to do network forensics?


Student one:

Hello Class/Farewell,

It has been nice working with everyone in the last 8 weeks, I am glad that I have taken this class because if anybody going into cybersecurity as a new learner then they have to understand the importance of how digital forensic is key towards any profession dealing in this field. The video I chose goes over the digital Forensics process as a whole but when dealing in this realm every person has to realize how each computer, network and mobile intertwine as a whole process. The network process is a straight forward of someone analyzing incoming or outgoing network traffic. When dealing in the digital forensics section the analysis has to understand how to accredit a user, hold criminal evidence, and report all known breaches to their enterprise that deals with cybersecurity. While conducting inside the enterprise the teams that is investigating has to follow certain procedures, and policies in placed within the company. We need to know how to do digital forensics mainly one reason, if someone is going be analysis or in the field cybersecurity we have understand how to maintain and collect data that could be used for a trial. If not done properly the criminal accused may be released if your job is not done properly. Compromising data for a well-known company is any person’s goal. The workforce of forensics will ever be growing in today’s society of how advance the new generation is evolving in this realm. I am glad that I am studying in this field and I cannot wait until I actually get to put my learning into effect.

Anthony

Work Cited:

ISACA HQ.2017. Overview of Digital Forensics. https://www.youtube.com/watch?v=ZUqzcQc_syE

Årnes, A. (2018). Digital forensics : an academic introduction . Hoboken, New Jersey ;: Wiley.

Akbal, E., & Dogan, S. (2018). Forensics Image Acquisition Process of Digital Evidence. International Journal of Computer Network and Information Security, 10(5), 1–8. https://doi.org/10.5815/ijcnis.2018.05.01

Student two:

Good morning everyone and welcome to the final week,

When I did a generic search for “Network Forensics” on YouTube looking for videos this week I found a lot of videos that centered around the use of Wireshark. This makes sense considering the fact that network forensics often consists of the capturing and analysis of packets. Wireshark is one of the more well-known and easy to use packet-capture tools out there.

As I was looking through videos I found one that while it featured heavy use of Wireshark was more built around using various tools built into Linux distributions to perform forensic analysis. Although others could be built and used this particular video featured Kali Linux and SANS SIFT Workstation. Kali is a Linux distribution that is largely known for it’s penetration testing capabilities but has quite a few tools that can be used for forensic purposes as well. The SIFT Workstation is designed around digital forensics and incident response and is distributed by SANS, a well known and respected network security training company. A third Linux distribution I have experience with but was not featured in this video is Sumuri Paladin, which is focused around computer forensics. The best part about all three of these operating systems is that they are free to download and use. Yes, you will have to do a lot of work from the command line, but it’s not that bad once you get used to it.

What I liked a lot about this video was that the instructor didn’t just show tools, he walked through several scenario based examples which help ensure the concepts he is teaching come across. While it is rather lengthy (almost 2 hours) it is work a watch for anyone interested in the topic of network forensics.

https://www.youtube.com/watch?v=Zx2Amo2_6Ww

-Jesse

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.