Research Article
Next-Generation Digital Forensic Readiness BYOD Framework
Table 3
Components used for forensic traffic analysis.
| Sl. no. | Forensic components | Use |
| 1 | ISE | For authentication logs | 2 | Check Point Forensic Blade | For forensic traffic analysis | 3 | Check Point SandBlast | For threat hunting | 4 | Wireshark | Logs analysis |
|
|