How realistic do you think this case is? Can and do events like this happen in real networked applications? What information should Mary collect first to support her investigation? What forensic methods and processes will Mary have to use on the log servers and the administrators’ workstations?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here