What tools would you have in your toolkit? Document the following:
* the features of each tool
* how much does each tool cost (if applicable)
* advantages/disadvantages
2 As stated in the text, “Network Forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks…”
Research by finding an article or case study discussing network forensics.
Using at least 500 words – summarize the article you have chosen