Analyzing network traffic and understanding packets is an important role for IT security professionals. Hackers also use network traffic to steal information or to learn about an organization’s network infrastructure.
- How can each method of packet capture be useful, and why might one be chosen over another?
- How is the OSI model useful when discussing packet capture?
In preparing your response, cite at least one source from professional or academic literature, such as articles from peer-reviewed journals and relevant textbooks. For this course, the use of Wikipedia is not considered an academic or professional reference. You should also be sure to proof-read and spell-check your responses. All sources should be formatted per APA style writing standards guidelines.