Problem
• Watch the TED talk.
• Most documented piece of malware
• Imagine you were called in to investigate the incident in a t ightly controlled environment
• Address these questions
• How would you approach the forensic investigation?
• Is there anything you would do differently from what is publicly documented?
• As attacks get more sophisticated how can forensics be used to identify and mitigate damage earlier?
Ted Talk Video: "Cracking Stuxnet a 21st Century Cyberweapon" by Ralph Langner.