ethernet, discuss how evide? If the network used in the office had been a wireless network rather than switched ethernet, discuss how evidence of employee A's sending and receiving encrypted messages could have been achieved Identify the tools that would be needed and explain the part they would play in the attack

tools we might use: Cain and able, Wireshark, PGP, Netbus