Analyzing network traffic and understanding packets is an important role for IT security professionals. Hackers also use network traffic to steal information or to learn about an organization’s network infrastructure.
- How can each method of packet capture be useful, and why might one be chosen over another?
- How is the OSI model useful when discussing packet capture?
Your paper is required to be 4-5 pages in length, not including the title and references pages, and should cite at least one scholarly resource other than the course materials. It should follow University academic writing standards and APA style guidelines, as appropriate.
Oriyano, S. P. (2014). Hacker techniques, tools, and incident handling (2nd ed.). Burlington, MA: Jones & Bartlett Learning.