- Digital Forensics and Incident Response
- Gerard Johansen
- 131字
- 2021-07-02 18:49:47
Analysis
Once the Examination phase has extracted the potentially relevant pieces of data, the digital forensic examiner then analyzes the data in light of any other relevant data obtained. For example, if the digital forensic analyst has discovered that a compromised host has on open connection to an external IP address, they would then correlate that information with an analysis of the packet capture taken from the network. Using the IP address as a starting point, the analyst would be able to isolate the particular traffic. From here, the analyst may be able to determine that the compromised host is sending out a beacon to a C2 server. From here, using additional sources, the analyst may be able to determine what the particular attack vector is tied with that IP address.
- Flask Web全棧開發實戰
- Mastering Adobe Captivate 2017(Fourth Edition)
- 算法精粹:經典計算機科學問題的Java實現
- Rust編程從入門到實戰
- Windows Server 2012 Unified Remote Access Planning and Deployment
- 深度學習:算法入門與Keras編程實踐
- Python:Master the Art of Design Patterns
- C語言程序設計
- Java語言程序設計教程
- 持續集成與持續交付實戰:用Jenkins、Travis CI和CircleCI構建和發布大規模高質量軟件
- JSP程序設計實例教程(第2版)
- SQL Server 入門很輕松(微課超值版)
- 物聯網系統架構設計與邊緣計算(原書第2版)
- 人人都能開發RPA機器人:UiPath從入門到實戰
- 優化驅動的設計方法