Journal of Information Systems Education


This first half of this paper details the tools and methodologies employed to determine the identity and physical location of a hacker who infiltrated a server and altered a Web page. The second half of this paper recreates the scenario in a laboratory environment, in order to instruct students on system administration, server security, network management, and basic data communications.