Chapter 1. Becoming Network 007s
Welcome to the world of spies, glamor, high technology, and fast...
Wait a minute!
Are you sure you are reading the right book? Wasn't this book supposed to be about network forensics?
Yes, you are reading the right book!
Let me put you at ease. This is about network forensics. That said it also is a glamorous world full of high-tech spies and fast data (no cars, unfortunately). This is a world where the villains want to own the world (or at the very least, your digital world) and if they can't own it, they would like to destroy it.
This world needs a hero. A person who can track down spies, identify stolen secrets, beat the villains at their own game, and save the world in the bargain.
A tech-savvy, cool, and sophisticated hero! A digital 007! Come on, admit it, who doesn't fancy themselves as James Bond? Here's your chance, an opportunity to become a network 007.
Interested? Read on…
In this chapter, we will build an understanding of what we need to know in order to venture in the area of network forensics. We will cover the following topics here:
- 007 characteristics in the network world
- Identifying threats to the enterprise
- Data breach surveys
- Defining network forensics
- Differentiating between computer forensics and network forensics
- Strengthening our technical fundamentals
- Understanding network security
- Network security goals
- Digital footprints