Detection and Incident Response Cuckoo’s Egg Analysis
Read Cliff Stoll’s book, Cuckoo’s Egg (any edition), and write a 3 to 4 page paper on the intrusion detection and incident response techniques used in the book. Identify proper techniques (what will you use as your reference or base framework?) used and those that did not work. This is not a book report
Communication