This assignment delves into a simulated cyberattack on SSN Software Company, detailing the investigation process. Using tools like Wireshark, key logger analysis, and employee records, the report unravels the attack's origins, revealing the perpetrator as Peter, a disgruntled employee who acted as a spy for a competitor. The case highlights techniques employed by attackers, forensic methods used to identify them, and the importance of cybersecurity measures within organizations.