preview

Disadvantages Of Cyber Forensics

Satisfactory Essays

Introduction Computer forensic specialist use different types of methods to try and exploit the required media they are trying to investigate. Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Cyber analyst’s ability to understand the different types of networks, configurations, packets, computer attacks, MAC addresses, and sniffers is critical in the ways to exploit cyber criminals. This is an emerging field of law enforcement and is becoming essential in catching criminals of all kinds. Additionally, large companies have begun to hire cyber experts to ensure data theft and networks …show more content…

Many types of networks exist such as Local Area Network (LAN), Wide Area Network (WAN), Wireless Local Area Network (WLAN), Metropolitan Area Network (MAN), Storage Area Network (SAN), Cluster Area Network (CAN), and a Personal Area Network (PAN). LAN and WAN are the two types of networks that are most primarily used. A LAN utilizes network connected devices at small or short distances. An office, schools, or homes that do not span large distances typically utilize a LAN. A small LAN only utilizes two computers while others can use up to 1000 computers. Wide area networks or WANs cover large physical distances and can be seen as far as anywhere on the globe. A WAN acts as a LAN in many different connected locations. However, a WAN is not owned by just one organization but can be collectively owned and used by many organizations. Next, a virtual private network or VPN acts like a private network extending its ability to act privately across a public network. This sends data secure and encrypted between to computers therefore creating a point to point connection that may be left undisturbed. A benefit of this is that VPNs can be accessed remotely and save resources across an organization or at home. Technology has produced different types of networks for the different uses required by the processes required. Multiple configurations can be set up on a network which will allow a system administrator to obtain the desired network objective. When

Get Access