In this live lesson, learners will step into the shoes of a digital forensics consultancy who have been employed to find the source of a serious leak at Tobermory Telecom. Was it a sophisticated cyber attack, a rogue insider, or just a mistake? Students will learn about and use digital forensics techniques to analyse the evidence.
Investigate to leak to see if it's genuine
Identify what type of information has been leaked
Find out who is responsible