Promotions:

FREE Threat Assessment

Find out what is getting through your security systems with a FREE threat assessment

Latest News:

Code Red - The latest zero day vulnerability, the Heartbleed Bug in the OpenSSL cryptographic library. Affects tech providers using OpenSSL's 1.0.1 and the 1.0.2-beta release.

Platform Updates:

Version 1.2: Intrusion Detection

Client Login
Sign on Register Forgot?
  • 01924 919241
Home / Services / Computer Forensics

Computer Forensics Cyber Security

panosec logo

What is Computer Forensics

The application of computer investigation and analysis techniques to determine potential evidence.

This digital evidence may be used to support, or disprove, aspects of an investigation or litigation involving companies, individuals or even law enforcement.

computer forensics

Investigation Process

Computer Forensics is a four (4) step process:

Acquisition
Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices.
Identification
This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites.
Evaluation
Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court.
Presentation
This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws.

What does a PanoSec Computer Forensics Analyst do?

  • Analysis of digital devices for a given reason -For the Prosecution, Defence, Courts, Commercial Organisations or a member of the public.
  • Simply reduce the amount of data a customer is faced with
  • Recovery of information from damaged or inaccessible media devices
  • Assisting clients in the understanding of other "Experts" reports
  • A Technical Advisor

Evidence Collection Principles for Computer Forensics Investigation

  • Maintain chain of custody of the evidence
  • Acquire evidence from volatile as well as non-volatile memory without altering or damaging original evidence.
  • Maintain the authenticity and reliability of evidence gathered.
  • No modification of data while analysing it.
computer forensics investigations