This situation deals with an insider threat. There has been an attack on a victim, and the victim believes it was an attack by an insider. Your job is to look at the computer logs for their system and find the IP that intruded upon the system, analyze it, and find a MAC (media access control) address. Once you have a MAC address, try to identify a computer based on it. When you’re finished, take the quiz to measure your knowledge and understanding.
Scroll down to start the activity.