Term Papers: •Is there anything you would do differently from what is publicly documented?
•Watch the TED talk and read up on Stuxnet
•Most documented piece of malware
•Imagine you were called in to investigate the incident in a t ightly controlled environment
•Address these questions
•How would you approach the forensic investigation?
•Is there anything you would do differently from what is publicly documented?
•As attacks get more sophisticated how can forensics be used to identify and mitigate damage earlier?
Please follow and like us: