Chapter 11. Putting It All Together
Information in This Chapter
A network forensics security incident can present the network forensics examiner with various investigative challenges. The challenges stem from the fact that in most cases the scope of an investigation is not immediately apparent. This is due to scale of most organizational network environments today and the requirement to provide three different types of supportive enterprise services. The three types are internal users and systems access to external and internal services, remote users and systems access to external and internal services, and external users and systems access to internal services.
Network ...
Get Digital Forensics for Network, Internet, and Cloud Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.