From the course: Network Forensics

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Network logs

Network logs

From the course: Network Forensics

Start my 1-month free trial

Network logs

- [Speaker] A computer network consists of various devices, each of which produces log files of it's own. They logged events that require human attention in various files. Hardware and software errors, as well as intrusion attempts, are examples. The hardware components include personal computers, or PCs, servers, routers, and firewalls. Most refer to any piece of hardware in a network which has a unique address such as media access control, or MAC, an internet protocol, or IP addresses. PCs are abundant sources of network logs. They generate the records of users' network activities which contain the details on the websites they visit, and the remote servers they access. Servers are also hosts but different from PCs because they specialize in providing certain services, for example, web servers which serve content to browsers. Web server log files document when a host accesses a specific website. If a web server encounters an error while processing a request, they also capture the…

Contents