Preloader

DIGITAL FORENSICS

Cyber forensics can be defined as the process of extracting information and data from computer storage media and guaranteeing its accuracy and reliability.

Digital forensics serves as a supporting proof or corroborating evidence often made by prosecutors and defendants to refute a claim that a certain activity was done by a specific person using a piece of digital equipment. The most common use is to recover erased digital evidence to support or disprove a claim in court of law or in civil proceedings such as the eDiscovery process in courts. Forensics is also used during internal corporate investigations or intrusion investigation which includes additional activities like network and log review.

The challenge of course is actually finding this data, collecting it, preserving it, and presenting it in a manner acceptable in a court of law.

SERVICES OFFERED INCLUDE

SERVICES OFFERED INCLUDE

Fraud Risk Assessment & Controls Design

• Database Forensics

• Forensics Dataanalysis

• Computer Forensics

• Mobile Device Forensics

• Network Forensics

OUR APPROACH

OUR APPROACH

Our consultants can perform both offline and online analyses as per the requirement:

Offline Analysis

An offline analysis can be done when our investigator powers down the computer and removes it from the network. Our investigator creates an exact copy of the computer’s hard drive to ensure that the files remained unchanged, and ensure all evidence is collected.

Online Analysis

An online analysis can be done when there are occasions it is impossible to power down a computer, requiring an online analysis. For instance, management may not permit the shutdown of a company’s only e-commerce server. In this circumstance our investigator will gather as much evidence as possible while the system remains running and connected to a network.

EXECUTION | HOW IS IT DONE?

Our computer forensics procedures can be distilled into three major components:

• Make a digital copy of the original evidence:Our investigators make a copy of the evidence and work with the copy to reduce the possibility of inadvertently changing the original evidence.

• Authenticate that the copy of the evidence: Our investigators will then verify the copy of the evidence is exactly the same as the original.

Analyze the digital copy: The specific procedures performed in an investigation are determined by the specific circumstances under which the investigation is occurring.

Interested In Digital Forensics?

Send us a Message




Contact Form

Get In Touch !

Please disable Adblock!