Research Article

Next-Generation Digital Forensic Readiness BYOD Framework

Table 3

Components used for forensic traffic analysis.

Sl. no.Forensic componentsUse

1ISEFor authentication logs
2Check Point Forensic BladeFor forensic traffic analysis
3Check Point SandBlastFor threat hunting
4WiresharkLogs analysis