Network security cyber terrorism attack


Network Security Cyber Terrorism Attack (word count 150)
Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis (i. e, what kind of technology or access could you use)? If it were in the US, under what condition would that be legal? What kind of information might you be able to discover by applying traffic analysis, and (briefly) how would you do the analysis?

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Network security cyber terrorism attack
Reference No:- TGS0130050

Expected delivery within 24 Hours