Sample Answer
Linux Tools
What tools have you read or heard about that run on Unix or Linux. Do these tools have similar functionality to tools you are familiar with that run on other platforms?
Netstat, tcpdump, and IPTraf are some of the tools that run on Linux and are responsible for monitoring the traffic in a network. Wireshark and Glances are tools similar to tcpdump and IPTraf but run on both Windows and Unix operating systems. The netstat utility tool is also available for Windows and Unix operating systems.
The IPTraf provides real-time traffic monitoring while tcpdump performs packet analysis in the network. Netstat is used to display the network connections. By monitoring traffic, performing packet analysis and displaying the connections in the network, the three Unix tools detect any problems in the network but do not provide protection against malicious code or viruses.
Do the Unix or Linux tools provide protection against hostile code or viruses?
The Unix operating systems are not widely used; hence, attackers do not target them as much as other operating systems such as Windows. However, the Unix operating systems do need protection against malicious code and viruses. Examples of antivirus software that can be used on the Unix operating systems include ClamAV, Snort, and Nessus. These antivirus tools are used to scan for vulnerabilities and malicious code in the network and clean it.
How do you think investigators can best use this tool?
Investigators can use the IPTraf tool to find the network’s source and destination of the traffic. The tool collects information concerning network traffic. The investigators can also use the netstat tool to check the different connections in the network. Identification of connections in a network aids the investigators in determining if there are foreign devices connected to the network. The tcpdump tool analyzes packets in a network. Investigators can use it to determine the contents of a suspicious packet.
When do you recommend using this tool? Why?
Using the tools to identify malicious attempts to gain access to the network is recommended. This is because early detection of attempts to gain unauthorized access to the network can be useful in preventing the success of unauthorized access.
References
20 Command Line Tools to Monitor Linux Performance. (n.d.). Retrieved December 5, 2018, from https://www.tecmint.com/command-line-tools-to-monitor-linux-performance/
Noyes, K. (2011, April 12). Seven Free Security Tools for Linux. Retrieved December 5, 2018, from https://www.pcworld.com/article/224955/7_free_security_tools_for_linux.html
IPTraf – An IP Network Monitor. (n.d.). Retrieved December 5, 2018, from http://iptraf.seul.org/
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Linux Tools
- What tools have you read or heard about that run on Unix or Linux. Do these tools have similar
Linux Tools
functionality to tools you are familiar with that run on other platforms?
- Do the Unix or Linux tools provide protection against hostile code or viruses?
- If so, how is it used to protect against hostile code or viruses?
- If not, what would you do to supplement the tool to ensure you have adequate protection for your system during an investigation?
- How do you think investigators can best use this tool?
- When do you recommend using this tool? Why?
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."