Read the required readings and complete these two task about the topic.
Required readings:
- Vural, I., & Venter, H.S. (2009). Investigating identity concealing and email tracing techniques(Links to an external site.)Links to an external site.. Information Security for South Africa. Proceedings of the ISSA 2009 Conference (pp. 293–308). Retrieved from http://icsa.cs.up.ac.za/issa/2009/Proceedings/Full/40_Paper.pdf
- Pilli, E.S., Joshi, R.C., & Niyogi, R. (2010, October). Network forensic frameworks: Survey and research challenges. Digital Investigation, 7(1-2), 14–27. doi:10.1016/j.diin.2010.02.003
- Nasir, Q., & Al-Mousa, Z.A. (2013, November). Honeypots aiding network forensics: Challenges and notions(Links to an external site.)Links to an external site.. Journal of Communications, 8(11), 700–707. doi:10.12720/jcm.8.11.700-707
- Mitchell, B. (n.d.). VPN Tutorial: An introduction to VPN software, VPN hardware and protocols(Links to an external site.)Links to an external site.. Retrieved from http://compnetworking.about.com/od/vpn/a/vpn_tutorial.htm
- System Forensics, Investigation, and Response – Ch. 7. E-mail Forensics
- System Forensics, Investigation, and Response – Ch. 12. Performing Network Analysis
Two tasks:
- Write an brief discussion about the topic
- The weekly discussion should be (relatively) short and somewhat informal.(around 200-250 words)
- Extend your points to make a thought paper. The thought papers should be longer (around 2 pages or more), and written more like a normal paper. This paper should expand on your ideas in the discussion and should include your own thoughts, interpretations, opinions, and insights.