Chapter 9. Network Investigations
Eoghan Casey, Christopher Daywalt, Andy Johnston and Terrance Maguire
Contents
Overview of Enterprise Networks
439 Evidence Preservation on Networks
457 Collecting and Interpreting Network Device Configuration
458 Forensic Examination of Network Traffic
479 Network Log Correlation— A Technical Perspective
505Introduction
Tracking down computer criminals generally requires digital investigators to follow the cybertrail between the crime scene and the offender's computer. The cybertrail can cross multiple networks and geographical ...