1. Provide an abstract 2. Introduction a. Introduce the subject of t

1. Provide an abstract
2. Introduction
a. Introduce the subject of the case study
3. Body — The meat of the case study should address…
a. Attribution
I. Who is the attacker?
ii. Why? What I the attacker’s motivation?
b. Technical
i. What type of attack?
ii. How did the attack work, from a technical point of view?
iii. How do you detect this type of attack?
C. Forensics
i. When did the attack occur? Timeline of the attack.
ii. Where did the attack occur? May or may not be physical
location. Think targets.
4. Conclusion
a. Since this is Intrusion Detection-in-Depth, I’m especially interested in your conclusions related to the attack type, technical details, and how to detect (and prevent).

Posted in Uncategorized

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount