It is conducted with specific objectives which include:
to understand the vulnerability that was exploited, to study
the severity of the attack and counteracting measures, to
penetrate into the compromised data in order to investigate
its origin and to obtain information about other compromised
machines [6].