Consider the following five questions and write an essay response to each one.

How do you go about finding information when you have been told that there has been a break-in?

What servers were compromised?
Was network equipment comprised?
What user accounts were employed to do gain access?
What vulnerabilities were exploited?
What can be done to prevent a recurrence?

Intrusion Detection System (IDS)