![]() ![]() ![]() Structure so that each layer of the OSI model will only see and deal with the information it needs in order to properly handle and deliver the data from one host to another on a computer network Reconstruct evidence for an investigationĮncapsulation the method of wrapping data from one layer of the OSI model in a new data.Document the evidence gathered on a network.Describe the tools used in investigating network traffic.Perform evidence gathering via sniffing.Understand the reasons for investigating network traffic.Understand the network and transport layers of the OSI model.Understand the physical and data link layers of the OSI model.Computer Forensics: Investigating Network Intrusions and Cybercrime (CHFI) (2016) 2 Chapter Investigating Network TrafficĪfter completing this chapter, you should be able to:
0 Comments
Leave a Reply. |