... response effort♦ Act as a point of contact for the team♦ Act as a liaison between incident response team and management, legal and lawenforcement♦ Delegate and organize efforts♦ • Technical intrusion ... Victim's networkweaknesses in just the way that it appears the system was attacked the day after Sneak's officecomputer was secured. After some additional investigation and analysis of ... Systems, and Arthur Andersen as a programmer,system analyst, project manager, and auditor.DedicationErienne, Kristina, and AndyMichael Jordan said it best, thus, what more can I say…I approached...