logo

Network Packet Forensic Report 2022

Task 1 – Question 1 to 10 Marks Task 1 – Network Map Question 11 Marks Weighting: 40% (Individual) High Distinction Distinction Credit/Pass Low Pass Fail Low Fail You have completed all 10 questions successfully. You have been able to provide overwhelming evidence that you have presented the correct conclusions. You have provided a detailed description of the digital forensics process used to analyze the digital artifact. You have shown an excellent understanding of digital forensics techniques. You have completed 9 questions successfully. You have been able to provide good evidence that you have presented the correct conclusions. You have provided a good description of the digital forensics process used to analyze the digital artifact. You have shown a good understanding of digital forensics techniques. You have completed 7 to 8 questions successfully. You have been able to provide reasonable evidence that you have presented the correct conclusions. You have provided a reasonable description of the digital forensics process used to analyze the digital artifact. You have shown a reasonable understanding of digital forensics techniques. You have completed 5 to 6 questions successfully. You have been able to provide acceptable evidence that you have presented

6 Pages3000 Words7 Views
   

Added on  2022-10-06

Network Packet Forensic Report 2022

Task 1 – Question 1 to 10 Marks Task 1 – Network Map Question 11 Marks Weighting: 40% (Individual) High Distinction Distinction Credit/Pass Low Pass Fail Low Fail You have completed all 10 questions successfully. You have been able to provide overwhelming evidence that you have presented the correct conclusions. You have provided a detailed description of the digital forensics process used to analyze the digital artifact. You have shown an excellent understanding of digital forensics techniques. You have completed 9 questions successfully. You have been able to provide good evidence that you have presented the correct conclusions. You have provided a good description of the digital forensics process used to analyze the digital artifact. You have shown a good understanding of digital forensics techniques. You have completed 7 to 8 questions successfully. You have been able to provide reasonable evidence that you have presented the correct conclusions. You have provided a reasonable description of the digital forensics process used to analyze the digital artifact. You have shown a reasonable understanding of digital forensics techniques. You have completed 5 to 6 questions successfully. You have been able to provide acceptable evidence that you have presented

   Added on 2022-10-06

ShareRelated Documents
Running head: REPORT ON NETWORK PACKET FORENSIC
REPORT
ON
NETWORK PACKET FORENSIC
Name of the Student
Name of the University
Author Note:
Network Packet Forensic  Report  2022_1
Network Packet Forensic1
Abstract- This paper has focused on the
analysis of the functionalities of Digital
Forensic. Followed by which it has
effectively discussed about the application
of Network Packet Forensic. In order to
support the discussion it has also
investigate the previous researches with
the purpose to elaborate the necessity of
the approached project which is based on
the application network packet forensic.
Following the discussion it also consist of
effective recommendation to address the
identified limitations.
Introduction:
The aim of this report is to discuss
about the application of digital forensic
considering the current industrial growth.
Digital forensic is nothing but a branch of
investigation which is applied only for the
purpose to investigate the unusual
activities present in the digital devices.
Digital forensic has been mostly utilized in
the cyber security field with the purpose to
detect the suspicious activities present in
an IT infrastructure. While discussing this
aspect it will also provide a detail
investigation result on the application as
well as on the necessity of digital forensic.
[1] Followed by this it will focus on the
classifications of it, in which it will discuss
the aspect of network packet forensic with
the purpose support the above discussion.
Considering the objective of this paper to
determine the benefits of digital forensic, a
detail investigation has been conducted
followed by which this paper consist a
detail elaboration of the background of
introducing the network forensic into the
digital forensic field with the purpose to
analyze the network traffic which will help
to gather the information about the
intrusion present in the network. Along
with this discussion it will also consist a
detail investigation on the application of
Network Packet Forensic relating it with
real time case scenario. After accounting
this discussion the paper will also include
the discussion on the identified limitations
followed by which it will suggest effective
mitigation approach which can be applied
to address the limitations.
Digital Forensic:
In the field of forensic science it has
been noticed that there is a huge
significance of digital forensic as it works
by investigating the criminal activities
present in the IT organizational
infrastructure. Followed by this aspect the
application of Digital Forensic has been
introduced into the digital world to
investigate and determine the suspicious
activities that may harm the services of the
identified organization. Considering the
above mentioned objective behind the
application of digital forensic it has been
noticed that currently in the IT field digital
forensic is participating with the purpose
to recover a digital system from the
unauthorized network intrusion as well as
from any sort of illegal activities which
has been accounted from the external
behavior.[2] Followed by this objective it
has been noticed that digital forensic holds
significant impact on the determination of
the intrusion that is present in the IT
server. In order to determine the
mentioned intrusion present in the network
sever digital forensic opt for several steps
which includes the collection of
information from the physical digital
devices with the purpose to get the
knowledge about the data loss or threats.
After completion of the information
gathering process it will then proceed from
the examination of those collected data
from which it can extract required data
with the purpose to proceed further with
the discussion. [3] After completion of the
above step it will then analyze the data by
which it will determine the affected area
and then report according to the analyzed
data. In the field of digital forensic there is
a huge application of digital forensic tools
present which includes the sniffer
wireshark as well as the linux distribution
system is also open for the digital forensic
operation. Followed by the above
discussion studies has proven that in
Network Packet Forensic  Report  2022_2
Network Packet Forensic2
digital forensic consists of several
branches in which it performs effective
performances with the purpose to detect
the intrusion in the computing field. Those
branches includes the network forensic,
computer forensic, digital image forensic,
memory forensic, digital video and audio
forensic, mobile device forensic.[4]
However, considering the current
industrial growth of the technology and the
digital threats network forensic is one of
the most effective as well as frequently
used digital forensic field. Considering this
aspect a detail elaboration of researches
conducted on the application of Network
Forensic is provided below.
Network Packet Forensic:
Followed by the above discussion it can
be stated that network forensic is one of
the most effective digital forensic
techniques which is utilized on the digital
devices with the purpose to monitor and
determine the unusual activities that
happens in the IT network server.
Comparing the network forensic
technology with the other digital forensic
technologies it has been noticed that
Network forensic it one of the most active
forensic technology as it deals with the
real time dynamic data. Followed by this
aspect in the procedure of network forensic
techniques it has been observed that it
works with the analyzing the network
environment from which it will detect the
intrusions which satisfies the technical and
legal aspects. Along with the above
operations it analyses the network server
by investigating and monitoring the
network servers from which the evidence
against the criminal can be found in the
organizational network server as it is quite
difficult for the criminal to erase the
evidence from the IT network server.
Followed by this aspect several researches
has mentioned that in order to collect the
network data two highly effective methods
are used which includes the “Stop look
listen” and the “Catch it as you can”
method. In the catch it as you can method
it analyses the network traffic from a
specific point of the network from where
each of the transaction passes, whereas the
in the Stop look listen method it has been
noticed that it works by analyzing the data
storage where all of the data are stored
with the purpose to make it a fastest as
well as effective process of intrusion
detection. Followed by the above
mentioned research several studies has
mentioned that in order to detect the
intrusion present in the network server, the
network forensic investigation are most
done on the TCP/IP, Ethernet as well as of
the internet.
TCP/IP-
According to the studies TCP and IP
holds significant impact on the passing the
network packets via the network. In order
to proceed with this above mentioned
objective it has been noticed that in
TCP/IP a router table is followed to
continue the process. Hence, in this scope
the application of forensic on the router
table will help to gather more information
about the network server activities.[5]
Ethernet-
Along with the above mentioned
application, the application of network
forensic on the Ethernet will help the
investigator to detect the network as gather
more data as it has been observed from
studies that investigation on Ethernet will
help to gather several information related
to the IP address, MAC address as well as
the ARP tables which helps to gather detail
information about the network activity.[6]
Internet-
Followed by the above investigation the
application of network forensic on the
internet can effectively provide the
evidence against the criminal related to the
internet activities. Hence, it can be stated
that the application of network forensic
technique can be effective if in case it is
applied in peer to peer sever traffic to
monitor the server activity. [7]
Network Packet Forensic  Report  2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology Security Management Report 2022
|10
|2743
|18

Introduction to Network Forensics
|5
|968
|73

Network Forensics Assignment - Real Time Analysis
|8
|1506
|265

Digital Forensics: A Case Study on Workplace Crime and Cloud-Based Forensics
|23
|7039
|53

Advance Security Techniques : Echrs Ltd
|15
|3951
|16

Report on Information System Security
|8
|1502
|153