Chapter 11. Putting It All Together
A network forensics security incident can present the network forensics examiner with various investigative challenges. The challenges stem from the fact that in most cases the scope of an investigation is not immediately apparent. This is due to scale of most organizational network environments today and the requirement to provide three different types of supportive enterprise services. The three types are internal users and systems access to external and internal services, remote users and systems access to external and internal services, and external users and systems access to internal services.

Network ...

Get Digital Forensics for Network, Internet, and Cloud Computing now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.