Investigation and analysis techniques to gather and preserve evidence computing device for court purpose which mainly comprises of
Disk – Memory Forensics
- Imaging Services of Desktop, Laptop, Mac book
- Data Recovery Services
- Deleted, partially overwritten or formatted data
- Water Damaged, Burned or Dropped Hard Drive
- Forensic Analysis of data from CPU, internal and peripheral storage devices, operating logs, software and operating instructions or operating manuals, computer materials, software and programs used to communicate with other terminals via telephone or other means, and any computer modems, monitors, printers, Network Logs etc.
- Advanced Email and Internet History examination.
- Analysis of Encrypted and Password Protected data.
- Networking device logs examination
- Detection & prevention of Malware Incidence
- Steganography decoding services
Network Forensics -
Monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection, computer virus definition analysis
- Network Performance Benchmarking
- Network Troubleshooting
- Transactional analysis
- Security Analysis
Cloud Forensics -
- Extract, Preserve and Analyse Cloud-Based Content - Digital crimes committed on the cloud requires cloud forensic investigation and analysis. When most of the organization are choosing cloud computing services for storing, sharing and protecting the data; the question of cloud security arises
Live Forensics -
- Using live response memory analysis techniques to identifying suspicious activities - Live forensic examines computers’ operating systems using custom forensics to extract evidence in real time. Many times, the details of the threat are unknown, so the first priority is identifying and quantifying the threat. Using live response memory analysis techniques, we can quickly pull a process listing showing what processes are running and begin identifying suspicious ones
Database Forensics -
- Analysis of Critical and sensitive information stored in database e.g. bank account data, health data etc. Acquisition, examination, analysis, and reporting of database through cross-drive analysis, live analysis and recovery of deleted files