Document the tools and steps used to process the "Set 5" data: : How the RAR was extracted and verified.
: Checking for login/logout times and service failures. IP_Leandro_Set5.rar
: Briefly state the purpose of the analysis (e.g., investigating a simulated data breach). Document the tools and steps used to process
Summarize the "who, what, when, where, and how" of the incident. and how" of the incident.