Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity PDF, ePub eBook D0wnl0ad
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book currently covers forensic analysis of Cisco network devices in any detail.Cisco Router and Switch Forensics is the first book devoted to criminal attacks, incident response, data collection, and legal testimony on the market leader in network devices, including routers, switches, and wireless access points.
Why is this focus on network devices necessary? Because criminals are targeting networks, and network devices require a fundamentally different approach than the process taken with traditional forensics. By hacking a router, an attacker can bypass a network's firewalls, issue a denial of service (DoS) attack to disable the network, monitor and record all outgoing and incoming traffic, or redirect that communication anywhere they like. But capturing this criminal activity cannot be accomplished with the tools and techniques of traditional forensics. While forensic analysis of computers or other traditional media typically involves immediate shut-down of the target machine, creation of a duplicate, and analysis of static data, this process rarely recovers live system data. So, when an investigation focuses on live network activity, this traditional approach obviously fails. Investigators must recover data as it is transferred via the router or switch, because it is destroyed when the network device is powered down. In this case, following the traditional approach outlined in books on general computer forensics techniques is not only insufficient, but also essentially harmful to an investigation.
Jargon buster: A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). A router is a more sophisticated network device that joins multiple wired or wireless networks together.
* The only book devoted to forensic analysis of routers and switches, focusing on the operating system that runs the vast majority of network devices in the enterprise and on the Internet
* Outlines the fundamental differences between router forensics and traditional forensics, a critical distinction for responders in an investigation targeting network activity
* Details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony
From reader reviews:
Edward Peterson:
A lot of people always spent their very own free time to vacation or maybe go to the outside with them family members or their friend. Were you aware? Many a lot of people spent they will free time just watching TV, or perhaps playing video games all day long. If you want to try to find a new activity this is look different you can read some sort of book. It is really fun for you. If you enjoy the book that you simply read you can spent the entire day to reading a e-book. The book Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity it is extremely good to read. There are a lot of folks that recommended this book. These people were enjoying reading this book. When you did not have enough space to create this book you can buy typically the e-book. You can m0ore very easily to read this book from the smart phone. The price is not too costly but this book has high quality.
Shaun Sae:
You can get this Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity by browse the bookstore or Mall. Just viewing or reviewing it could to be your solve challenge if you get difficulties on your knowledge. Kinds of this e-book are various. Not only by simply written or printed but can you enjoy this book by simply e-book. In the modern era similar to now, you just looking by your local mobile phone and searching what your problem. Right now, choose your current ways to get more information about your publication. It is most important to arrange yourself to make your knowledge are still revise. Let's try to choose proper ways for you.
Adam Hay:
Book is one of source of know-how. We can add our understanding from it. Not only for students but native or citizen need book to know the up-date information of year to be able to year. As we know those guides have many advantages. Beside most of us add our knowledge, could also bring us to around the world. By book Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity we can consider more advantage. Don't you to definitely be creative people? For being creative person must want to read a book. Only choose the best book that suitable with your aim. Don't become doubt to change your life with this book Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity. You can more inviting than now.
Read Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity for online ebook
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity Free PDF d0wnl0ad, audio books, books to read, good books to read, cheap books, good books, online books, books online, book reviews epub, read books online, books to read online, online library, greatbooks to read, PDF best books to read, top books to read Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity books to read online.
Tidak ada komentar:
Posting Komentar