Nowadays, due to the sophistication of adversarial attack vectors, techniques, and tactics, it is increasingly becoming challenging, if not difficult, to deter persistent threats in real-real time Some of these threats for Forensic Analysis includes, but are not limited to: Advanced Persistent Threats Lack of Due Diligence Inaccessibility of Services Weak Credential Information Liabilities of Shared System Exploitation of Cloud Services Malicious Insiders and Outsiders Random Data Loss and Theft Account hijacking and Data breaches Denial of service (DoS) / Distributed DoS Susceptible points of System / Software Uncertain APIs and Software Application GOAL: Pick a minimum of three from the above list and assume that it have had happened to your organization. How could you conduct a comprehensive forensic analysis and how could you prevent it from happening in the future. Feel free to add different attributes which you deem is necessary for your project. You may also want to consider following the five known steps in digital forensics: Detection Identify and collect the data, Storage Securely store the collected data against interference, Investigation Analyze and reconstruct the data to attain conclusion, Reporting Record the information of reconstructed data, Visualization Present the overall evidences from conclusion RULES: 1. Your strategy/plan must be attainable and yet realistic SUBMISSION: Identifies actual and potential issues/risks.