Resumen
Network professionals face an environment characterized by constantly increasing technological complexity and the daunting challenges posed by ill-intentioned intruders. Securing the systems that they are entrusted to manage is a task of primary importance. Effective network security includes protocols to detect, to investigate, and to preclude the recurrence of any breach in the installed security systems. This study investigates principal forensic techniques that are available to the network professional and provides an efficient access path to practical solutions to the post-breach segment of security system design.