ログイン

5 ) Network Forensics
9問 • 9ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    Define and Categorize “ Network Forensics Tools “:

    - Network traffic must be captured and its data frames decoded before it can be analyzed., - Define a “ Switched Port Analyzer (SPAN) “:, - This allows for the copying of ingress and/or egress communications from one or more switch ports to another., - Define a “ Packet Sniffer “:, - This is a piece of hardware or software that records data from frames as they pass over network media using methods such as a mirrored port or tap device., - A network sniffer should be placed inside a firewall or close to an important server., - Define “ tcpdump “:, - This is a data-network packet analyzer computer program that runs under a command line interface., - It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached., - Define “ Wireshark “:, - This is a free and open-source GUI-based packet analyzer that is used for network troubleshooting, analysis, software and communications protocol development, and education.

  • 2

    PT 1 | Define and Categorize “ Flow Analysis “:

    - Define a “ Full Packet Capture (FPC) “:, - This Captures the entire packet including the header and the payload for all traffic entering and leaving a network., - Define a “ Flow Collector “:, - This is a means of recording metadata and statistics about network traffic rather than recording each frame., - Flow analysis tools provides network traffic statistics sampled by a collector., - Define “ NetFlow “:, - This is a Cisco-developed means of reporting network flow information to structured database., - Gathers:, - Network protocol interface, - Version and type of IP, - Source and destination IP, - Source and destination port, - IPs type of service, - NetFlow provides metadata while packet captures provide a complete record of what occurred.

  • 3

    PT 2 | Define and Categorize “ Flow Analysis “:

    - Define “ Zeek (Bro) “:, - This is a hybrid tool that passively monitors a network like a sniffer and only logs data of potential interest., - Zeek performs normalization on the data., - This stores data as tab-delimited or Java Script Object Notation (JSON) formatted text files., - Define a “ Multi Router Traffic Grapher (MRTG)” , - This is a tool used to create graphs showing traffic flows through the network interfaces of routers and switches by polling the appliances using the Simple Network Management Protocol (SNMP).

  • 4

    Define and Categorize “ IP and DNS Analysis “:

    - Malware is used to be configured to contact a specific static IP or DN, - Define “ Known-bad IP Addresses “:, - This is an IP address or range of addresses that appears on one or more blacklists., - Reputation-based risk intelligence is used to create IP/URL block lists., - Attackers now use domain generation algorithms to overcome block lists., - Domain Generation Algorithm (DGA):, - This is a method used by malware to evade block lists by dynamically generating domain names for C2 networks., - What are the 5 Steps attackers use:, - Attacker sets up one or more dynamic DNS (DDNS) services., - Malware code implements a DGA to create a list of new domain names., - A parallel DGA is used to create name records on the DDNS service., - The malware tries a selection of the domains it has created to connect to C2., - C&C server communicates with a new seed for the DGA to prevent being blocked., - Fast Flux Network is a method used by malware to hide the presence of C&C networks by continually changing the host IP addresses in domain records using domain generation algorithms., - If you get a high rate of NXDOMAIN errors when resolving the DNS, it could be an indicator of a DGA., - Define “ Secure Recursive DNS Resolver “:, - This occurs when one trusted DNS server communicates with several other trusted DNS servers to hunt down an IP address and returns it to the client.

  • 5

    PT 1 | Define and Categorize “ URL Analysis “:

    - Define “ URL Analysis “:, - This is an activity that is performed to identify whether a link is already flagged on an existing reputation list, and if not, to identify what malicious script or activity might be coded within it., - What do we use these tools for:, - Resolving percent encoding., - Assessing redirection of the URL, - Showing source code for scripts in URL., - Define the “ HTTP Method “:, - This is a set of request methods to indicate the desired action to be performed for a given resource., - This is a request contains a method, a resource, a version number, the header, and the body of the request., - Define and Categorize “ HTTP Methods “:

  • 6

    PT 2 | Define and Categorize “ URL Analysis “:

    - Define “ GET “:, - The principal method used with HTTP and is used to retrieve a resource., - Define “ POST “:, - This is used to send data to the server for processing by the requested resource., - Define “ PUT “:, - This creates or replaces the requested resource., - Deduce “ DELETE “:, - This is used to remove the requested resource., - Define “ HEAD “:, - This retrieves the headers for a resource only and ignores the body., - Define “ Characters “:, - Data submitted via a URL is delimited by the ‘?’ character. :, - Query parameters are usually formatted as one or more name=value pairs with ampersands (&) delimiting each pair., - A ‘#’ is used to indicate a fragment or anchor ID and it not processed by the webserver., - %27http%3A%2F%2Fabc123.com%2Frat%2Ejs

  • 7

    PT 3 | Define and Categorize “ URL Analysis “:

    - Define “ HTTP Response Codes “:, - The header value returned by a server when a client requests a URL., - Define “ Common HTTP Response Codes “:, - Define “ 200 “:, - This Indicates a successful GET or POST request (OK)., - Define “ 201 “:, - This Indicates where a PUT request has succeeded in creating a resource., - Define “ 3xx “:, - This is any code in this range indicates that a redirect has occurred by the server., - Define “ 4xx “:, - Any code in this range indicates an error in the client request., - Define “ 400 “:, - This indicates that a request could not be parsed by the server., - Define “ 401 “:, - Indicates that a request did not supply authentication credentials., - Define “ 403 “:, - Indicates that a request did not have sufficient permissions., - Define “ 404 “:, - Indicates that a client is requested a non-existent resource., - “ 5xx “:, - Any code in this range indicates a server-side issue., - Define “ 500 “:, - Indicates a general error on the server-side of the application., - Define “ 502 “:, - Indicates a bad gateway has occurred when the server is acting as a proxy., - Define “ 503 “:, - Indicates an overloading of the server is causing service unavailability., - Define “ 504 “:, - Indicates a gateway timeout means an issue with theupstream server.

  • 8

    PT 4 | Define and Categorize “ URL Analysis “:

    - Define “ Percent Encoding “:, - This is a mechanism to encode 8-bit characters that have specific meaning in the context of URLs, also known as URL encoding., - A URL can contain only unreserved and reserved characters from the ASCII set., - Define “ Unreserved Characters “:, - - | a-z A-Z 0-9 - . _ ~, - Define “ Reserved Characters “:, - - | :/?#[]@!$&'()*+,;=, - A URL cannot contain unsafe characters, these include:, - Null string termination, - carriage return, - line feed, - end of file, - tab, - space, - | \ < > { }, - Percent encoding allows a user-agent to submit any safe or unsafe character (or binary data) to the server within the URL., - WARNING:, - Percent encoding can be misused to obfuscate the nature of a URL (encoding unreserved characters) and submit malicious input as a script or binary or to perform directory traversal., - Some really tricky attackers may double-encode the URL by encoding the percent sign, too!

  • 9

    What are the controls in I.S.O 27001:2022 that cover Network Forensics?

    - Here are the key controls in ISO 27001:2022 that cover aspects of network forensics:, - Organizational Controls (Primarily related to Incident Management):, - A.5.30 ICT readiness for business continuity:, - This control emphasizes the need to plan for business continuity and disaster recovery, which often includes considerations for investigating and recovering from security incidents that might involve network compromises. , - Being prepared for such events necessitates having the tools and processes in place for network forensics., - Example:, - A business continuity plan might outline procedures for isolating affected network segments and initiating forensic analysis to understand the scope and impact of a network-based attack., - A.5.35 Information security incident management planning and preparation:, - This control is fundamental. It requires establishing processes and procedures to manage information security incidents effectively. , - This includes defining roles and responsibilities, communication protocols, and procedures for identifying, reporting, assessing, responding to, and learning from incidents. , - Network forensics is a key activity within the incident response process, particularly for understanding the "what, when, where, and how" of a network-related incident., - Example:, - An incident response plan should detail the steps for preserving network logs, capturing network traffic, and engaging personnel with network forensic expertise., - A.5.37 Response to information security incidents:, - This control focuses on the actions taken when a security incident occurs. , - Network forensics activities, such as analyzing network traffic, examining firewall logs, and investigating intrusion detection/prevention system (IDS/IPS) alerts, are direct components of responding to network-based incidents. , - The goal is to understand the attack vector, the extent of the compromise, and the data affected., - Example:, - When a potential network intrusion is detected, the response might involve capturing network traffic using tools like Wireshark or tcpdump for later forensic analysis., - A.5.38 Analysis of information security incidents:, - This control highlights the importance of analyzing security incidents to understand their root causes, impacts, and to identify areas for improvement in security controls. , - Network forensics provides critical data for this analysis in cases involving network breaches or malicious activity., - Example:, - Analyzing network logs after a data exfiltration incident can help determine the attacker's path, the data accessed, and the duration of the compromise., - Technological Controls (Providing the necessary data for Network Forensics):, - A.8.15 Logging and Monitoring:, - This control is crucial for network forensics. Comprehensive logging of network activities, including traffic flows, firewall events, intrusion detection/prevention system alerts, and DNS queries, provides the raw data needed for forensic analysis. , - The effectiveness of network forensics heavily relies on the quality and retention of these logs., - Example:, - Detailed firewall logs showing denied and allowed connections, along with timestamps and source/destination IP addresses, are essential for reconstructing network-based attacks., - A.8.16 Monitoring activities:, - Continuous monitoring of network activity can help detect anomalies and potential security incidents that might trigger the need for network forensics. Early detection can preserve crucial evidence., - Example:, - Unusual network traffic patterns or connections to known malicious command-and-control servers, identified through monitoring, would initiate an investigation involving network forensics., - General Information:, - While "Network Forensics" isn't a standalone control, the principles and activities associated with it are deeply embedded within the incident management and logging/monitoring controls of ISO 27001:2022. , - Organizations aiming for ISO 27001:2022 certification need to demonstrate that they have the capabilities to conduct network forensics as part of their incident response framework. , - This includes having documented procedures, trained personnel, and the necessary tools to collect, preserve, and analyze network-based evidence effectively. , - The emphasis is on being prepared to investigate and respond to security incidents that involve the network infrastructure.

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    Define and Categorize “ Network Forensics Tools “:

    - Network traffic must be captured and its data frames decoded before it can be analyzed., - Define a “ Switched Port Analyzer (SPAN) “:, - This allows for the copying of ingress and/or egress communications from one or more switch ports to another., - Define a “ Packet Sniffer “:, - This is a piece of hardware or software that records data from frames as they pass over network media using methods such as a mirrored port or tap device., - A network sniffer should be placed inside a firewall or close to an important server., - Define “ tcpdump “:, - This is a data-network packet analyzer computer program that runs under a command line interface., - It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached., - Define “ Wireshark “:, - This is a free and open-source GUI-based packet analyzer that is used for network troubleshooting, analysis, software and communications protocol development, and education.

  • 2

    PT 1 | Define and Categorize “ Flow Analysis “:

    - Define a “ Full Packet Capture (FPC) “:, - This Captures the entire packet including the header and the payload for all traffic entering and leaving a network., - Define a “ Flow Collector “:, - This is a means of recording metadata and statistics about network traffic rather than recording each frame., - Flow analysis tools provides network traffic statistics sampled by a collector., - Define “ NetFlow “:, - This is a Cisco-developed means of reporting network flow information to structured database., - Gathers:, - Network protocol interface, - Version and type of IP, - Source and destination IP, - Source and destination port, - IPs type of service, - NetFlow provides metadata while packet captures provide a complete record of what occurred.

  • 3

    PT 2 | Define and Categorize “ Flow Analysis “:

    - Define “ Zeek (Bro) “:, - This is a hybrid tool that passively monitors a network like a sniffer and only logs data of potential interest., - Zeek performs normalization on the data., - This stores data as tab-delimited or Java Script Object Notation (JSON) formatted text files., - Define a “ Multi Router Traffic Grapher (MRTG)” , - This is a tool used to create graphs showing traffic flows through the network interfaces of routers and switches by polling the appliances using the Simple Network Management Protocol (SNMP).

  • 4

    Define and Categorize “ IP and DNS Analysis “:

    - Malware is used to be configured to contact a specific static IP or DN, - Define “ Known-bad IP Addresses “:, - This is an IP address or range of addresses that appears on one or more blacklists., - Reputation-based risk intelligence is used to create IP/URL block lists., - Attackers now use domain generation algorithms to overcome block lists., - Domain Generation Algorithm (DGA):, - This is a method used by malware to evade block lists by dynamically generating domain names for C2 networks., - What are the 5 Steps attackers use:, - Attacker sets up one or more dynamic DNS (DDNS) services., - Malware code implements a DGA to create a list of new domain names., - A parallel DGA is used to create name records on the DDNS service., - The malware tries a selection of the domains it has created to connect to C2., - C&C server communicates with a new seed for the DGA to prevent being blocked., - Fast Flux Network is a method used by malware to hide the presence of C&C networks by continually changing the host IP addresses in domain records using domain generation algorithms., - If you get a high rate of NXDOMAIN errors when resolving the DNS, it could be an indicator of a DGA., - Define “ Secure Recursive DNS Resolver “:, - This occurs when one trusted DNS server communicates with several other trusted DNS servers to hunt down an IP address and returns it to the client.

  • 5

    PT 1 | Define and Categorize “ URL Analysis “:

    - Define “ URL Analysis “:, - This is an activity that is performed to identify whether a link is already flagged on an existing reputation list, and if not, to identify what malicious script or activity might be coded within it., - What do we use these tools for:, - Resolving percent encoding., - Assessing redirection of the URL, - Showing source code for scripts in URL., - Define the “ HTTP Method “:, - This is a set of request methods to indicate the desired action to be performed for a given resource., - This is a request contains a method, a resource, a version number, the header, and the body of the request., - Define and Categorize “ HTTP Methods “:

  • 6

    PT 2 | Define and Categorize “ URL Analysis “:

    - Define “ GET “:, - The principal method used with HTTP and is used to retrieve a resource., - Define “ POST “:, - This is used to send data to the server for processing by the requested resource., - Define “ PUT “:, - This creates or replaces the requested resource., - Deduce “ DELETE “:, - This is used to remove the requested resource., - Define “ HEAD “:, - This retrieves the headers for a resource only and ignores the body., - Define “ Characters “:, - Data submitted via a URL is delimited by the ‘?’ character. :, - Query parameters are usually formatted as one or more name=value pairs with ampersands (&) delimiting each pair., - A ‘#’ is used to indicate a fragment or anchor ID and it not processed by the webserver., - %27http%3A%2F%2Fabc123.com%2Frat%2Ejs

  • 7

    PT 3 | Define and Categorize “ URL Analysis “:

    - Define “ HTTP Response Codes “:, - The header value returned by a server when a client requests a URL., - Define “ Common HTTP Response Codes “:, - Define “ 200 “:, - This Indicates a successful GET or POST request (OK)., - Define “ 201 “:, - This Indicates where a PUT request has succeeded in creating a resource., - Define “ 3xx “:, - This is any code in this range indicates that a redirect has occurred by the server., - Define “ 4xx “:, - Any code in this range indicates an error in the client request., - Define “ 400 “:, - This indicates that a request could not be parsed by the server., - Define “ 401 “:, - Indicates that a request did not supply authentication credentials., - Define “ 403 “:, - Indicates that a request did not have sufficient permissions., - Define “ 404 “:, - Indicates that a client is requested a non-existent resource., - “ 5xx “:, - Any code in this range indicates a server-side issue., - Define “ 500 “:, - Indicates a general error on the server-side of the application., - Define “ 502 “:, - Indicates a bad gateway has occurred when the server is acting as a proxy., - Define “ 503 “:, - Indicates an overloading of the server is causing service unavailability., - Define “ 504 “:, - Indicates a gateway timeout means an issue with theupstream server.

  • 8

    PT 4 | Define and Categorize “ URL Analysis “:

    - Define “ Percent Encoding “:, - This is a mechanism to encode 8-bit characters that have specific meaning in the context of URLs, also known as URL encoding., - A URL can contain only unreserved and reserved characters from the ASCII set., - Define “ Unreserved Characters “:, - - | a-z A-Z 0-9 - . _ ~, - Define “ Reserved Characters “:, - - | :/?#[]@!$&'()*+,;=, - A URL cannot contain unsafe characters, these include:, - Null string termination, - carriage return, - line feed, - end of file, - tab, - space, - | \ < > { }, - Percent encoding allows a user-agent to submit any safe or unsafe character (or binary data) to the server within the URL., - WARNING:, - Percent encoding can be misused to obfuscate the nature of a URL (encoding unreserved characters) and submit malicious input as a script or binary or to perform directory traversal., - Some really tricky attackers may double-encode the URL by encoding the percent sign, too!

  • 9

    What are the controls in I.S.O 27001:2022 that cover Network Forensics?

    - Here are the key controls in ISO 27001:2022 that cover aspects of network forensics:, - Organizational Controls (Primarily related to Incident Management):, - A.5.30 ICT readiness for business continuity:, - This control emphasizes the need to plan for business continuity and disaster recovery, which often includes considerations for investigating and recovering from security incidents that might involve network compromises. , - Being prepared for such events necessitates having the tools and processes in place for network forensics., - Example:, - A business continuity plan might outline procedures for isolating affected network segments and initiating forensic analysis to understand the scope and impact of a network-based attack., - A.5.35 Information security incident management planning and preparation:, - This control is fundamental. It requires establishing processes and procedures to manage information security incidents effectively. , - This includes defining roles and responsibilities, communication protocols, and procedures for identifying, reporting, assessing, responding to, and learning from incidents. , - Network forensics is a key activity within the incident response process, particularly for understanding the "what, when, where, and how" of a network-related incident., - Example:, - An incident response plan should detail the steps for preserving network logs, capturing network traffic, and engaging personnel with network forensic expertise., - A.5.37 Response to information security incidents:, - This control focuses on the actions taken when a security incident occurs. , - Network forensics activities, such as analyzing network traffic, examining firewall logs, and investigating intrusion detection/prevention system (IDS/IPS) alerts, are direct components of responding to network-based incidents. , - The goal is to understand the attack vector, the extent of the compromise, and the data affected., - Example:, - When a potential network intrusion is detected, the response might involve capturing network traffic using tools like Wireshark or tcpdump for later forensic analysis., - A.5.38 Analysis of information security incidents:, - This control highlights the importance of analyzing security incidents to understand their root causes, impacts, and to identify areas for improvement in security controls. , - Network forensics provides critical data for this analysis in cases involving network breaches or malicious activity., - Example:, - Analyzing network logs after a data exfiltration incident can help determine the attacker's path, the data accessed, and the duration of the compromise., - Technological Controls (Providing the necessary data for Network Forensics):, - A.8.15 Logging and Monitoring:, - This control is crucial for network forensics. Comprehensive logging of network activities, including traffic flows, firewall events, intrusion detection/prevention system alerts, and DNS queries, provides the raw data needed for forensic analysis. , - The effectiveness of network forensics heavily relies on the quality and retention of these logs., - Example:, - Detailed firewall logs showing denied and allowed connections, along with timestamps and source/destination IP addresses, are essential for reconstructing network-based attacks., - A.8.16 Monitoring activities:, - Continuous monitoring of network activity can help detect anomalies and potential security incidents that might trigger the need for network forensics. Early detection can preserve crucial evidence., - Example:, - Unusual network traffic patterns or connections to known malicious command-and-control servers, identified through monitoring, would initiate an investigation involving network forensics., - General Information:, - While "Network Forensics" isn't a standalone control, the principles and activities associated with it are deeply embedded within the incident management and logging/monitoring controls of ISO 27001:2022. , - Organizations aiming for ISO 27001:2022 certification need to demonstrate that they have the capabilities to conduct network forensics as part of their incident response framework. , - This includes having documented procedures, trained personnel, and the necessary tools to collect, preserve, and analyze network-based evidence effectively. , - The emphasis is on being prepared to investigate and respond to security incidents that involve the network infrastructure.