This document discusses network forensics and the role of forensic experts. It covers how networking works by breaking data into packets, how network penetration is possible by spoofing IP addresses, and defines cyber forensics as applying security practices to reduce damage from attacks. Forensic experts locate security threats, analyze practices, help implement responses to attacks, and prepare legally-sound evidence.