Assume that your company has suffered a security breach in which it appears that some sensitive information belonging to your clients may have been accessed by unauthorized users. You do not know if the breach resulted from an internal source or an external source. In analyzing your network traffic, address the following in your main post:
- Describe the types of traffic you will look at in order to uncover the source of the attack
- Explain the tools you are going to use.
After your main post, reply to a minimum of two classmates’ posts and analyze the tools and methods you would use in comparison with those of your fellow learners. Each response must be substantive and advance the discussion while focusing on concepts related to materials in this module.