The last security incident of this week occurred on Friday morning. The security adminis- trator received an alert from the intrusion detection system (IDS) in the Boston office that indicated suspicious activity originating from that office directed at the company main- frame system. The workstation IP address was available in the IDS logs. The security administrator reviewed the access logs from the mainframe and confirmed that the suspi- cious activity reported by the IDS needed to be reported to the Vice President of Informa- tion Security. The Challenge The security administrator needed to identify which user was associated with the IP ad- dress at the time of.