How would you approach the forensic investigation


Problem

• Watch the TED talk.

• Most documented piece of malware

• Imagine you were called in to investigate the incident in a t ightly controlled environment

• Address these questions

• How would you approach the forensic investigation?

• Is there anything you would do differently from what is publicly documented?

• As attacks get more sophisticated how can forensics be used to identify and mitigate damage earlier?

Ted Talk Video: "Cracking Stuxnet a 21st Century Cyberweapon" by Ralph Langner.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: How would you approach the forensic investigation
Reference No:- TGS02101520

Now Priced at $15 (50% Discount)

Recommended (98%)

Rated (4.3/5)