One page for each. Link to source(s) at bottom of pages Case Project 13-2: Diamond Model of Intrusion Analysis The Diamond Model of Intrusion Analysis is a framework for examining network intrusion events. Use the Internet to research this model. Identify how it is used, its strengths and weaknesses, and how widely implemented it is. What is your conclusion about this framework? How useful does it appear to be to you? Write a one-page analysis of your research. Case Project 13-4: Sources of Forensics Data IP software monitors can provide insight into an incident for a forensics evaluation. Use the Internet to research NetFlow, sFlow, and IPFIX. How are they used? What are their differences? What are their similarities? Create a table that lists the strengths and weaknesses of each.