Use Case

In an IT company, a disgruntled employee decided to retaliate against his employer. As a developer, he had access into internal company systems, but was unable to access certain sensitive company information which he wanted. He took several suspicious actions within the network...

View the use case in .pdf here.