What time did the attack happen? How did the hacker get into the network? What computers were compromised? What computers were accessed? What data was extracted from the network?
When completing the case study you must have a minimum of 3-5 outside sources cited and referenced in the paper. Your full 3 page term paper is due at the end of week 8. In addition to the 3 pages of the paper itself, you must include a title page and a references page. Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor’s name. Your references page must be written in APA citation style
You are hired by JLA Enterprise to conduct a Forensic Examination after a network intrusion occurs at their corporate office. Your job is to determine the source of the network intrusion and provide as much information regarding the attack as possible. Here are some things to consider when explaining what happened during the network intrusion: What time did the attack happen? How did the hacker get into the network? What computers were compromised? What computers were accessed? What data was extracted from the network? What type of attack was conducted? Howl long did the attacker have access to the network? Is there any persistence on the network for future attacks?
You are asked to conduct a forensics examination of the network and provide a forensic report explaining what happened during the attack and what corporate data was compromised. The report should cover the above information, as well as create a timeline that shows the attack from the initial stages of the attack to when the data was extracted from the network.