Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!


ISSC 456 discussion response

ISSC 456 discussion response

ISSC 456 discussion response

Question Description


I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

Find a video that shows how to perform a specific network forensics process, summarize the video, and attach it to your discussion. As an investigator, why do you need to know how to do network forensics?

Student one:

Hello Class/Farewell,

It has been nice working with everyone in the last 8 weeks, I am glad that I have taken this class because if anybody going into cybersecurity as a new learner then they have to understand the importance of how digital forensic is key towards any profession dealing in this field. The video I chose goes over the digital Forensics process as a whole but when dealing in this realm every person has to realize how each computer, network and mobile intertwine as a whole process. The network process is a straight forward of someone analyzing incoming or outgoing network traffic. When dealing in the digital forensics section the analysis has to understand how to accredit a user, hold criminal evidence, and report all known breaches to their enterprise that deals with cybersecurity. While conducting inside the enterprise the teams that is investigating has to follow certain procedures, and policies in placed within the company. We need to know how to do digital forensics mainly one reason, if someone is going be analysis or in the field cybersecurity we have understand how to maintain and collect data that could be used for a trial. If not done properly the criminal accused may be released if your job is not done properly. Compromising data for a well-known company is any person’s goal. The workforce of forensics will ever be growing in today’s society of how advance the new generation is evolving in this realm. I am glad that I am studying in this field and I cannot wait until I actually get to put my learning into effect.


Work Cited:

ISACA HQ.2017. Overview of Digital Forensics.

Årnes, A. (2018). Digital forensics : an academic introduction . Hoboken, New Jersey ;: Wiley.

Akbal, E., & Dogan, S. (2018). Forensics Image Acquisition Process of Digital Evidence. International Journal of Computer Network and Information Security, 10(5), 1–8.

Student two:

Good morning everyone and welcome to the final week,

When I did a generic search for “Network Forensics” on YouTube looking for videos this week I found a lot of videos that centered around the use of Wireshark. This makes sense considering the fact that network forensics often consists of the capturing and analysis of packets. Wireshark is one of the more well-known and easy to use packet-capture tools out there.

As I was looking through videos I found one that while it featured heavy use of Wireshark was more built around using various tools built into Linux distributions to perform forensic analysis. Although others could be built and used this particular video featured Kali Linux and SANS SIFT Workstation. Kali is a Linux distribution that is largely known for it’s penetration testing capabilities but has quite a few tools that can be used for forensic purposes as well. The SIFT Workstation is designed around digital forensics and incident response and is distributed by SANS, a well known and respected network security training company. A third Linux distribution I have experience with but was not featured in this video is Sumuri Paladin, which is focused around computer forensics. The best part about all three of these operating systems is that they are free to download and use. Yes, you will have to do a lot of work from the command line, but it’s not that bad once you get used to it.

What I liked a lot about this video was that the instructor didn’t just show tools, he walked through several scenario based examples which help ensure the concepts he is teaching come across. While it is rather lengthy (almost 2 hours) it is work a watch for anyone interested in the topic of network forensics.


We offer the best custom essay writing services at an affordable rate. We have done this assignment before, we can also do it for you.

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Essay Pillars only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Essay Pillars are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Essay Pillars is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Essay Pillars, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.