Introduction

What?

Cyber Defenders Digital Forensics challenges

Why?

Gathering evidence to understand the progress of actions carried out by an attacker on a computer or an information system.

How?