Computer foresnics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law while Mobile Forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions.
The follwing are the steps we undertake in conducting computer forensics
a) Collecting Digital Evidence
Digital evidence is any information or data of value to an investigation that is stored on, received by, or transmitted by an electronic device. Text messages, emails, pictures and videos, and internet searches are some of the most common types of digital evidence.Most criminals now leave a digital footprint or digital trail; a suspect’s IP address, posting on a Social Media platform or using their mobile device for everyday use in place of a traditional computer and camera. This is information could reveal: Intent, Location and time of crime, Relationship with victim(s), and Relationship with other suspect(s)
b) Forensic Witnesses
We have a credible forensics witness/expert who will help in our collection of digital evidence by unveiling reliable and credible information that ius acceptable by a judge.
c) Enterprise Forensics
This is a defensive and offensive strategy we use to combat computer crime. We specifically examine the use of GRR Rapid Response (GRR) – an advanced open source distributed enterprise forensics system – in the triaging stage of common incident response investigations. We show how this system can be leveraged for automated prioritization of evidence across the whole enterprise fleet and describe the implementation details required to obtain sufficient robustness for large scale enterprise deployment.
d) Data Collection And Preservation
When sensitive information is compromised, it’s critical to ensure electronic evidence is handled with precision and care to prevent it from being overwritten, destroyed, or otherwise corrupted. With VigilCybersec, you can feel confident knowing our data collection and data preservation experts follow a strict chain-of-custody protocol at every stage of the process to improve the outcomes of on-site investigation and reduce your potential for litigation and fines
e) Data Recovery And Forensic Analysis
We always employ forensically accurate processes, including appropriate chain of custody and documentation. We understand case law regarding the accuracy and reliability of digital tools. We’ll apply state-of-the art technology to your forensic analysis, but we also have the experience to accurately interpret findings, turning data points into a clear story and timeline that can be presented in court.
Data Security/Information Security
Data security refers to protective digital privacy measures applied to prevent unaothorizwed access to computers, databases and websites. Here at vcs-inc, we intergrate latest data security technologies including, backups, data masking, data erasure and Encryption. One of the most commonly encountered methods of practicing data security is the use of authentication. With authentication, users must provide a password, code, biometric data, or some other form of data to verify identity before access to a system or data is granted
With all of the vital personal and business data being shared on computer networks every day, security has become one of the most essential aspects of networking. No one recipe to fully safeguard networks against intruders exists. Network security technology improves and evolves over time as the methods for both attack and defense grow more sophisticated. Our team ensures your physical network security is not overlooked by ensuring your hardware protected from theft or intrusion, password management techniques, updates and patches and network stress testing techniques.
Email security refers to the collective measures used to secure the access and content of an email account or service. Our team conducts proactive email security measures that include: Strong paswwords, Password Rotations, Spam filters and Desktop-based anti-virus/ anti-spam applications.
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Nearly all businesses nowadays have wifi installed but what exactly are the measures they take to ensure its not compromised by hackers? Here at vcs-inc we assess the best wireless security protocol and Encryption that is WEP, WPA and WPA2, AES and TKIP Encryption and thus advice our client accordingly.
Mobile device identification is necessary at the beginning of the forensic examination at vcs-inc. The identification process includes understanding of the type of cell phone, its OS, and other essential characteristics to create a legal copy of the mobile device’s content.There are many tools and techniques available in mobile forensics. However, the selection of tools and techniques during an investigation depends on the type of mobile device and its associated media. Our team Gathers data from Mobile devices in two ways: Physical Acquisition and Logical Acquisition. Depending on our client's needs we callect different data types from a mobile device i.e call log, SMS, Images, audio, video, GPS data and apps data.
Techniques and tools we use for mobile forensics
we use the two common techniques that is Physical and logical extraction whereby in physical extraction we use cable connection or JTAG while in logical we conduct via bluetooth, infrared or cable connection. other tools used are Micro Read, Chip-off and Hex Dump. Leave the experts to take care of all your mobile needs!