Pro ling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a pro le of the incident?
- The manufacturer of the system compromised
- The logic, formatting and elegance of the code used in the attack
- The nature of the attack
- The vulnerability exploited in the incident
Reveal Solution Next Question