SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Securitarian




FORENSIC
INFORMATION TECHNOLOGY
[Type the author name]




                         2013
Table of Contents
IT FORENSIC .............................................................................................................................................. 3
Possibility of breach of security ................................................................................................................ 3
Nature of Attacks...................................................................................................................................... 3
   Internal Intrusion ................................................................................................................................... 3
   External Intrusion .................................................................................................................................. 4
FORENSIC ................................................................................................................................................. 4
Forensic Type ............................................................................................................................................ 5
Forensic Forensic Process Model .............................................................................................................. 6
Our Services .............................................................................................................................................. 7




                  Securitarian                                                                                                  Confidential Material
          2
IT FORENSIC

        The IT Computer Forensic is investigatory approach for finding the evidences,
extent of loss & culprits, when some information security breach has taken place.
Forensic solution, lets examiners acquire data from a wide variety of devices, unearth
potential evidence with disk level forensic analysis, and craft comprehensive reports on
their findings, all while maintaining the integrity of their evidence.

      A recent study indicates that over 93% of information produced is in digital format.
The same study also noted that 85% of all criminal, civil, and company violations are
done by means of digital Intrusion.



POSSIBILITY OF BREACH OF IT SECURITY

   •       Theft of Company Secrets (client or employee lists)
   •        Employee Sabotage or Terrorism
   •        Credit Card Fraud
   •        Financial Crimes
   •        Embezzlement (money or information)
   •        Economic Crimes
   •        Harassment (sexual)
   •        Child Pornography
   •        Major Crimes
   •        Identity Theft (short or long-term plans)



   Nature of Attacks

             o Internal
                    USB
                         PEN Drives
                         External Hard Drives
                    LAN
             o External
                    Web
                    Mail
                    IM



INTERNAL INTRUSION

Pen Drive Intrusion

             o Details of all pen drives installed on a system
             o Recorded as per O/S artifacts with timeline

             Securitarian                                                Confidential Material
       3
o Analysis of all pen drives used on different work station on a Network

Local Area Network Intrusion

           o Any suspected user Login Analysis with Victims computer in the Network
           o Artifacts with regard to different incidents taken place during that log on
             period

   EXTERNAL INTRUSION

   1. Web Intrusion

          Trojan
          Malware
          Spyware

   2. Mails

               As an Attachment

   3. IM

          During communication
          Attachment




Forensic

      Onsite search & acquisition of digital/electronic evidence and custody
      Filtration and consolidation of data including emails and files
      Law Firm consultations including defence strategies Corporate investigations
      Expert witness service Computer security, hacker tracking and in-house protection
      Computer Forensic Audits to comply with the Sarbannes Oxley Act or as a part
       of Information Security Audits
      Fraud Investigations
      Computer forensics including forensic analysis of all file systems
      Email investigations- tracking of malicious / threatening e-mail senders
      Establishment of computer forensic labs Creation of incident response teams
       (IRT)
      Forensic bit stream imaging of various digital storage devices
      Training in detection and analysis of digital evidence Intellectual property theft
       investigations/ Source code theft investigations




           Securitarian                                                   Confidential Material
       4
Forensic Type
Log Forensic:

      To Analyse all kinds of log prepared by the operating system and devices

Artifact Forensic:

      To Locate and analyse huge number of Artifacts with reference to Chats,
      Communications, Web Browsing and File sharing activites occuring in wide
      range of softwares

Time Line:

      To find out when exactly with date and time any specific event happened on
      the system

Forensic Spots:
            All types of foot prints consolidations for any unathorised activity happened
     on the system


Device Incident Forensic:

      Installation / Activation of any External Hardware devices attached to the system

Reversing Analysis:

      Decoding / Reverse Engineering of any incident/ activity done on any system

Network Forensic:

      To check and investigate who has logged into the system and when

Email Forensic:

      Scanning of all emails




          Securitarian                                                   Confidential Material
     5
COMPUTER FORENSIC PROCESS MODEL


     Plan                Aquire     Extract           Analyse            Report
1. Plan

       A computer forensics investigation begins with a well defined plan. A right
formatted plan save time, increase the amount of relevant data,and produce the highest
quality results, We work with staff investigators and security personnel to identify and
target sources of evidence, gain an understanding of the case, and apply the proper
procedures.

2. Acquire:

             The Acquisition process ranges from complete computer forensic           disk
imaging for gathering information from sources in a consistent manner.

3. Extract:

     To Extract Bit by Bit Data from the Hard Drives & other such places by using Best
computer forensic software tools is the Backbon of   any Forensic task.

4. Analyze:

      Even the smallest hard disk drives contain tens of thousands of files.

       Seuritarian uses advanced techniques and tools to isolate only the most relevant
electronic data. It is not just the Tools or Software    which gives accurate analysis but
the ways and means of extracting             and analysing data at the Micro level and then
corelating and         consolidating the same for solving the case.

5. Report:

       Once the analysis is complete, presenting an understandable, defendable, and
complete report is key. The ability to defend the       process and     testify to the
methodologies used makes our experts             unrivaled in the field of     computer
forensics.




          Securitarian                                                    Confidential Material
     6
We offer following services:

      Computer Forensics including forensic analysis of all file systems
      Mobile Forensics for Phone and PDA Analysis
      Network Forensics
      Incidence & emergency response services
      Forensic bit stream imaging of various digital storage devices
      Data recovery
      Deleted file recovery
      Password recovery
      Steganography detection
      Inappropriate & pornogrpahic content detection & Analysis
      Comprehensive search with in hard disks, networks and storage devices
      Physical and logical media analysis
      Corrupt operating system data retrieval
      Voice matching and biometric analysis
      Video Analysis & enhancements
      Email investigations- tracking of malicious or threatening e-mail senders
      Email database analysis
      On site acquisition of digital/electronic evidence and custody maintenance
      Filtration and consolidation of data including emails and files
      Hacker tracking and protection
      Digital Fraud Investigations
      ediscovery
      Content analysis




           Securitarian                                                  Confidential Material
       7

Weitere ähnliche Inhalte

Was ist angesagt?

04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
Kranthi
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Sagar Rahurkar
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
Kranthi
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 

Was ist angesagt? (20)

Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 

Andere mochten auch

Andere mochten auch (6)

Syarat Ikhtiologi
Syarat IkhtiologiSyarat Ikhtiologi
Syarat Ikhtiologi
 
KIEP 오늘의 세계경제 제13-09호
KIEP 오늘의 세계경제 제13-09호KIEP 오늘의 세계경제 제13-09호
KIEP 오늘의 세계경제 제13-09호
 
Kiderudite for investor
Kiderudite for investorKiderudite for investor
Kiderudite for investor
 
Pris sur le vif
Pris sur le vifPris sur le vif
Pris sur le vif
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 

Ähnlich wie IT forensic

Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 

Ähnlich wie IT forensic (20)

Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
180 184
180 184180 184
180 184
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023Cyber Forensics|Digital Forensics|Cyber Crime-2023
Cyber Forensics|Digital Forensics|Cyber Crime-2023
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

IT forensic

  • 2. Table of Contents IT FORENSIC .............................................................................................................................................. 3 Possibility of breach of security ................................................................................................................ 3 Nature of Attacks...................................................................................................................................... 3 Internal Intrusion ................................................................................................................................... 3 External Intrusion .................................................................................................................................. 4 FORENSIC ................................................................................................................................................. 4 Forensic Type ............................................................................................................................................ 5 Forensic Forensic Process Model .............................................................................................................. 6 Our Services .............................................................................................................................................. 7 Securitarian Confidential Material 2
  • 3. IT FORENSIC The IT Computer Forensic is investigatory approach for finding the evidences, extent of loss & culprits, when some information security breach has taken place. Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence. A recent study indicates that over 93% of information produced is in digital format. The same study also noted that 85% of all criminal, civil, and company violations are done by means of digital Intrusion. POSSIBILITY OF BREACH OF IT SECURITY • Theft of Company Secrets (client or employee lists) • Employee Sabotage or Terrorism • Credit Card Fraud • Financial Crimes • Embezzlement (money or information) • Economic Crimes • Harassment (sexual) • Child Pornography • Major Crimes • Identity Theft (short or long-term plans) Nature of Attacks o Internal  USB  PEN Drives  External Hard Drives  LAN o External  Web  Mail  IM INTERNAL INTRUSION Pen Drive Intrusion o Details of all pen drives installed on a system o Recorded as per O/S artifacts with timeline Securitarian Confidential Material 3
  • 4. o Analysis of all pen drives used on different work station on a Network Local Area Network Intrusion o Any suspected user Login Analysis with Victims computer in the Network o Artifacts with regard to different incidents taken place during that log on period EXTERNAL INTRUSION 1. Web Intrusion  Trojan  Malware  Spyware 2. Mails As an Attachment 3. IM  During communication  Attachment Forensic  Onsite search & acquisition of digital/electronic evidence and custody  Filtration and consolidation of data including emails and files  Law Firm consultations including defence strategies Corporate investigations  Expert witness service Computer security, hacker tracking and in-house protection  Computer Forensic Audits to comply with the Sarbannes Oxley Act or as a part of Information Security Audits  Fraud Investigations  Computer forensics including forensic analysis of all file systems  Email investigations- tracking of malicious / threatening e-mail senders  Establishment of computer forensic labs Creation of incident response teams (IRT)  Forensic bit stream imaging of various digital storage devices  Training in detection and analysis of digital evidence Intellectual property theft investigations/ Source code theft investigations Securitarian Confidential Material 4
  • 5. Forensic Type Log Forensic: To Analyse all kinds of log prepared by the operating system and devices Artifact Forensic: To Locate and analyse huge number of Artifacts with reference to Chats, Communications, Web Browsing and File sharing activites occuring in wide range of softwares Time Line: To find out when exactly with date and time any specific event happened on the system Forensic Spots: All types of foot prints consolidations for any unathorised activity happened on the system Device Incident Forensic: Installation / Activation of any External Hardware devices attached to the system Reversing Analysis: Decoding / Reverse Engineering of any incident/ activity done on any system Network Forensic: To check and investigate who has logged into the system and when Email Forensic: Scanning of all emails Securitarian Confidential Material 5
  • 6. COMPUTER FORENSIC PROCESS MODEL Plan Aquire Extract Analyse Report 1. Plan A computer forensics investigation begins with a well defined plan. A right formatted plan save time, increase the amount of relevant data,and produce the highest quality results, We work with staff investigators and security personnel to identify and target sources of evidence, gain an understanding of the case, and apply the proper procedures. 2. Acquire: The Acquisition process ranges from complete computer forensic disk imaging for gathering information from sources in a consistent manner. 3. Extract: To Extract Bit by Bit Data from the Hard Drives & other such places by using Best computer forensic software tools is the Backbon of any Forensic task. 4. Analyze: Even the smallest hard disk drives contain tens of thousands of files. Seuritarian uses advanced techniques and tools to isolate only the most relevant electronic data. It is not just the Tools or Software which gives accurate analysis but the ways and means of extracting and analysing data at the Micro level and then corelating and consolidating the same for solving the case. 5. Report: Once the analysis is complete, presenting an understandable, defendable, and complete report is key. The ability to defend the process and testify to the methodologies used makes our experts unrivaled in the field of computer forensics. Securitarian Confidential Material 6
  • 7. We offer following services:  Computer Forensics including forensic analysis of all file systems  Mobile Forensics for Phone and PDA Analysis  Network Forensics  Incidence & emergency response services  Forensic bit stream imaging of various digital storage devices  Data recovery  Deleted file recovery  Password recovery  Steganography detection  Inappropriate & pornogrpahic content detection & Analysis  Comprehensive search with in hard disks, networks and storage devices  Physical and logical media analysis  Corrupt operating system data retrieval  Voice matching and biometric analysis  Video Analysis & enhancements  Email investigations- tracking of malicious or threatening e-mail senders  Email database analysis  On site acquisition of digital/electronic evidence and custody maintenance  Filtration and consolidation of data including emails and files  Hacker tracking and protection  Digital Fraud Investigations  ediscovery  Content analysis Securitarian Confidential Material 7