Forensics Part 4: The Digital Post-Mortem — Healing the City
We have found the Artifacts, analyzed the Ghosts, and reconstructed the Timeline. The intruder has been identified and their path is clear. But a Mindful Architect knows that the job …
"Innovate, Implement, Inspire."
We have found the Artifacts, analyzed the Ghosts, and reconstructed the Timeline. The intruder has been identified and their path is clear. But a Mindful Architect knows that the job …
In the first two parts of our Forensics series, we collected Artifacts (Logs) and analyzed Ghosts (RAM). But right now, we just have a pile of evidence. To catch an …
In our first archaeology lesson, we looked at Artifacts (logs) left on the hard drive. But modern intruders are clever. They know that files leave footprints, so they often choose …
In our previous levels, we built a city and even practiced attacking it. But if a real intruder entered your city today, would you actually know what they did? Standard …
In the previous parts of the Dojo, we built our Sanctuary and populated it with Vulnerabilities. Now, it is time to put on the mask of the intruder. To be …
In Part 1, we built the Sandboxed Sanctuary—the physical room for our Dojo. But a warrior cannot practice with a straw man that never moves. To learn how to hunt …
For five levels, we have been building and managing a “Digital City.” But a true Mindful Architect knows that a fortress is only as strong as the pressure it can …
In the old days of the physical city, we relied on the “Castle Walls.” If you were inside the building and plugged into the wall, we trusted your computer. But …
If Active Directory is the “Constitution” of our city, then Group Policy (GPO) was the set of physical laws we enforced within the city walls. But now that our citizens …
In the previous levels, we built a beautiful, secure, and hybrid “Identity City.” But how do our citizens actually get their tools? In the old world of IT, when a …