Digital Forensics Service

Computer system by default have some basic audit and logging mechanism and user activity in computer system leave behind activity of users using the computing system, be it mobile or computer.

Digital forensics is a branch of forensic science with the scope of the recovery and investigation of material found in digital devices, often in relation to computer crime, in civil or just private investigation.

Digital forensics investigations have a variety of application, for example — to support or to prove wrong by argument or evidence a hypothesis before criminal or civil courts.

i. Civil cases deal with protecting the rights and property of individuals (often associated with lost person, family disputes), contractual disputes between commercial entities where as electronic discovery or information preserve may be required.

ii. Private sector forensics consultancy may require in such as during internal corporate investigations, inappropriate use of computing device or intrusion investigation.

iii. Criminal cases involve the alleged breaking of laws that are defined by legislation and that are enforced by the police and prosecuted by the court.

The typical forensic process consists of maintaining a chain-if-custody in the retrieval, forensic imaging (acquisition) and analysis of digital media and the production of a report of the collected evidence or information.

Digital Forensics can be used to attribute evidence to specific suspects, determine intent, identify sources or to identify direct evidence of a crime incident.

General Investigations are much broader in scope than other areas of forensic analysis involving complex time-lines or hypotheses.

A chain of custody of digital forensic investigation commonly consists of 3 stages: acquisition or imaging of information source/ media (secure read only imaging) , analysis, and reporting.

The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved; computer forensics, network forensics, forensic data analysis and mobile device forensics.

Leave a Reply

Your email address will not be published. Required fields are marked *