How to spot a data leak

Investigate the data leak at a telecoms company

Leaks plugged
5 1 2 4
Share on
Start lesson

Lesson overview

In this live lesson, learners will step into the shoes of a digital forensics consultancy who have been employed to find the source of a serious leak at Tobermory Telecom.   Was it a sophisticated cyber attack, a rogue insider, or just a mistake?   Students will learn about and use digital forensics techniques to analyse the evidence.

Objectives
  • Investigate to leak to see if it's genuine

  • Identify what type of information has been leaked

  • Find out who is responsible

Start the activity

Play