Poor coding can negatively affect the general functioning of a website due to internal factors of mismatch in command and external factors that arise from attacks launched to it. One of the most common attacks is the Cross Site Scripting (XSS). This attack occurs when a web application sends user data to a web browser without first encoding or validating it. Flaws in XSS allow attackers to pass in a script as user data that further executes in the user's browser. Possible consequences include phishing, user session hijack, website defacement and introduction of worms. The result may lead to a fall of an entire company (Michael et al, 200)
The network firewall is material in the form of software or a hardware for network based security. It builds a bridge that joins the internal network it protects after proving security of the source, which is another network. It does this by controlling incoming and outgoing traffic and analyzing packet data upon the set rules. The router log records information on what is happening in the network and the threats identified by the firewall. In case of attacks, these two should be the second in the step of curing the network off similar attacks in the future. A packet sniffer becomes important in analysis of the network because it enables interception of log traffic passing over a digital network (Kevin, Connolly, 2003).
There is need to solve crimes or find information from networks and the computers, this may be through live system forensics, which finds information from encrypted files systems before the computer is shut down. This method improves on time and materials that form a requirement in dead system analysis in computer forensics. In addition, data may be lost after the computer is shut down and may be difficult to recover. There as to be consistency in the information provided as evidence otherwise, there is no sense in conducting the forensic analysis, hence live system analysis is made the top most priority (Eoghan, 2009).
Common forensic tools include, the Spector investigator, which is a windows platform with user activity monitoring. It replays computer activities in detail enabling a conclusive survey. Another tool is the Registry Recon, it rebuilds windows registries from anywhere on the drive and parses them for deep analysis (Sanderson, 2006). The better of the two is Spector, because it follows the exact interest of the forensic purpose.
References
Sanderson, P (December 2006). "Mass image classification". Digital Investigations 3 (4): 190–195
Michael G. Noblett; Mark M. Pollitt, Lawrence A. Presley (October 2000). "Recovering and examining computer forensic evidence".
Kevin J. Connolly (2003). Law of Internet Security and Privacy. Aspen Publishers. p. 131. ISBN 978-0-7355-4273-0
Various (2009). Eoghan Casey, ed. Handbook of Digital Forensics and Investigation. Academic Press. p. 567. ISBN 0-12-374267-6. Retrieved 27 August 2010.