CSI Maui: Forensics in The Case of the Compromised Server
Project and Program:
Enterprise Data Center,
Communications Server
Tags:
Proceedings ,
2012 ,
SHARE in Atlanta 2012
Many of you have a lot of knowledge about the TCP/IP protocol. While this knowledge is the base, one must still understand how to apply it in a real situation. This is what the TCP/IP Forensics session is about! How do I take a problem (either real time or historical) and follow the clues to find out not only what happened but more importantly WHY it happened. Understanding the WHY provides you background to make changes to your TCP/IP environment to prevent the problem from recurring.
Laura Knapp, AES
Back to Proceedings File Library