1. Discuss the initial- and extensive-response field kits describe in this chapter. What do you think about the kits? Would you add or remove something from the kits?
2. Analyze and discuss a case where Company A claims its network was compromised by a connection from Company B network. How should both companies proceed? Who should be involved?