O'Reilly logo

Learning Network Forensics by Samir Datt

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, you learned about another valuable resource in our endeavor to understand network forensics. The importance of logging and different parameters in log management have been highlighted and discussed. We understood the questions we need to answer when we are setting up a logging system that will assist us at the time of a network forensic investigation. We have seen the importance of clock accuracy, correlation, collection, storage, and a host of other factors in logging. We have seen how getting multiple and disparate logs into a single log management system can help us connect the dots and give us an insight into the activities of the intruders zeroing in on our network.

In the next chapter, we will move on to another very ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required