What is Data Forensics?Have any questions? Click here and send it to us .
Data Forensic is an analysis of data in the study of Digital forensics. It examines structured data with regard to incidents of financial crime. The aim is to discover and analyse patterns of fraudulent activities. Data from application systems or from their underlying databases is referred to as structured data.
Mobile Forensics: EADH is the only company in Africa, and one of the approximately 30 companies’ worldwide, providing JTAG and chip-off forensics. We have the capability to data extraction from dead phones and gadgets. Wein-house specialized equipment worth approximatelyUSD20,000 and have certified mobile forensic experts with a firm base of knowledge and vast experience in the field.
Computer and Network Forensics:
Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
EADH team has a number of skilled and articulated digital forensic investigators having an experience of at least 8 years in digital forensics. All our team members have been certified as EnCE, CCFE, CEH and CHFI etc.
Databases are a key source of electronic evidence. Regardless of the size of the organization or the complexity of the database used – from a local building contractor using QuickBooks®, to a massive, multinational company that manages everything in an ERP (Enterprise Resource Planning), there is evidence contained within the database. Whether you suspect tampering, editing or deletion of data, or you have to produce information stored in a database of any size, a database forensics expert can analyze your needs, design a production or extraction plan, and make the data accessible and usable.
Types of Database Applications Suitable for Forensic Examination
|· Oracle Databases – including Oracle Financials
· MySQL, PostgreSQL. MS SQL Server
· IBM Mainframes (IMS, DB2 Etc.)
· XML, Access, DBX
· Windows, Unix/Linux, OSX
· Enterprise Resource Planning or ERP Systems
· Sage and Microsoft Financials
· Accounting Applications
· Midrange Systems (Stratus and HP)
· Small Business Management Systems
· Credit Card Processing Systems
· SAP and PeopleSoft
· SAS/Cloud Applications
|· Data Warehouse and Business Intelligence
· Accounting Systems
· Supply Chain and Inventory Management
· Cash Management and Treasury Management
· Engineering and Architectural Management
· Airline and Hotel Reservations
· Healthcare Management and Hospital Systems
· FDA Regulated Systems
· Search Engines and Knowledge Management Systems
· Source Code Repositories
· Custom Business Applications
What Types of Information Can Be Discovered?
Sources of extremely valuable information can be, and routinely are, overlooked. In intellectual property cases, for example, financial databases may be very important for damages, but knowledge management systems, source code repositories and document management systems can yield amazing insight into an alleged infringement, while helping defendants protect against troublesome fishing expeditions, and/or invalidate claims against them. These specialized databases can be used to review document lifecycle and versioning. Even extended metadata, like keywords, descriptions, annotations and comments, can give insight to the purpose of a document, reveal who authored or accessed information, and expose to where it was routed. In the hands of a highly trained and perceptive expert, a new view of the available data may also be achieved. Whether you’re producing a database or requesting it, you need the assistance of a court-tested and proven group of experts like ours at EADH.
Database forensics come into play during Intellectual Property (IP) or patent infringement cases, corporate espionage and even intrusion events like a data breach or an instigated virus infection. Often it’s in the structured ESI of a database where a savvy database forensics expert will find the evidence that will make or break a case. And should a database forensic examination lead outside of the database to computers, such as desktops and laptops, or digital devices like phones, tablets and pads, or even into a cloud computing/storage system, EADH can continue the hunt for data without missing a step.
Whether you are a hospital dealing with the Health Insurance Portability and Accountability Act (HIPAA), or a financial institution bound by Sarbanes-Oxley compliance (SOX) or even a retailer forced to comply with the Payment Card Industry Data Security Standard (PCI DSS compliance), there can be severe consequences if missteps are taken. EADH has worked on thousands of cases in a plethora of industries, and we’re completely conversant with regulatory procedures and acting within them. Further, we have legal advisement support staff at all of our locations and assigned to every case.
GPS and Other Digital Forensics: We are one of the few companies in the world that does forensic investigations for GPS devices and other digital devices likes mart watches, pagers, etc.
Our Scope of area we offer Training
1. computer Forensics,
2. mobile ( Cellebrite, MPE+ and OXYGEN Forensics Suite) and other digital media forensics
3. Hands on practice with tools like FTK, EnCase v7, Cellebrite)
4. JTAG, Chip-Off Forensics (we target govt. personnel)
1. Data Security & Loss Prevention,
2. IT Governance & Risk Management,
3. Incident Response,
4. Introduction to disaster data recovery,
5. Compliance Governance)
6. VAPT (internal, external and web application testing)