Perform a Network Digital Forensic Investigation

Many types of network forensic analyses are used to discover the details of a network attack, but only some will be used in the prosecution of an offender. You need to follow forensic investigative techniques that will stand up to legal challenges.

Read “Puzzle #1: Ann’s Bad AIM,” located on the LMG Security website (2009). Answer the question at the end of the puzzle in a Word document. Report the findings of your investigation. As this is part of an investigation, you need to provide your step-by-step process. Use screen captures where appropriate.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

Powered by WordPress