Describe the tools you have selected: How do each of the tools work? How are they different from each other?
As a cyber crime professional you have many tools in your arsenal to stop network, DOS and/or Windows attacks.
Read the article, 21 Best Free Digital Forensic Investigation Tools, which briefly describes many of the tools.
Select two forensic investigator tools from the list below:
Autopsy.
Magnet Encrypted Disk Detector.
Wireshark.
Magnet RAM Capture.
Network Miner.
NMAP.
RAM Capturer.
FAW Forensics Acquisition of Websites (This is a tool to acquire Web pages for forensic investigation).
HashMyFiles.
CrowdResponse.
ExifTool.
SIFT.
Browser History Capturer and Browser History viewer by Foxton.
Sleuth Kit.
CAINE.
Volatility Framework.
Paladin Forensic Suite.
FTK Imager.
Bulk_Extractor.
LastActivityView.
FireEye RedLine.
Describe the tools you have selected:
How do each of the tools work?
How are they different from each other?
Why do you believe that these two tools are the best choice to stop network, DOS, and/or Windows attacks? Provide a rationale.
Describe an event or instance when one of these tools is the superior counter measure.