Digital Forensics

What is Data Forensics?[show_tagwebs_beauty_contact_popup_form id=”1″]

Data Forensic is an analysis of data in the study of Digital forensics. It examines structured data with regard to incidents of financial crime. The aim is to discover and analyse patterns of fraudulent activities. Data from application systems or from their underlying databases is referred to as structured data.

Mobile Forensics: EADH is the only company in Africa, and one of the approximately 30 companies’ worldwide, providing JTAG and chip-off forensics. We have the capability to data extraction from dead phones and gadgets. Wein-house specialized equipment worth approximatelyUSD20,000 and have certified mobile forensic experts with a firm base of knowledge and vast experience in the field.

Computer and Network Forensics:

Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

Computerforencicspic

Statistics of Clients Distribution

EADH Digital Forensic lab has been equipped with the internationally verified and most admissible tools in the court of law like Encase, FTK and NUIX. We do digital forensics on all the operating systems including Linux, IOS and Windows. From live tonon-live forensics all the scenarios are covered by our team. The standard digital forensic process or phases: acquisition, examination, analysis and reporting are taken care of effectively and efficiently. All the reports are prepared in accordance with country’s specific cyber laws. For the countries which doesn’t have the cyber laws yet are provided the report prepared in accordance with US Cyber Laws.
Our track record speaks for us which sows our 100% success for all the cases which have been done by us. We have helped many clients winning their cases in the courts of law.

EADH team has a number of skilled and articulated digital forensic investigators having an experience of at least 8 years in digital forensics. All our team members have been certified as EnCE, CCFE, CEH and CHFI etc.

Database Forensics
Databases are a key source of electronic evidence. Regardless of the size of the organization or the complexity of the database used – from a local building contractor using QuickBooks®, to a massive, multinational company that manages everything in an ERP (Enterprise Resource Planning), there is evidence contained within the database. Whether you suspect tampering, editing or deletion of data, or you have to produce information stored in a database of any size, a database forensics expert can analyze your needs, design a production or extraction plan, and make the data accessible and usable.

Databases as a Source of Electronic Evidence
When a database is part of the evidence needed, one must look beyond the single database to the business applications that use the data, such as business intelligence systems, marketing applications, payroll and commissions, insurance, employee benefits, contribution applications, etc. Database applications often share data with systems out of the direct control of the data owner – a dining rewards application could easily tie into multiple credit card processing databases, or a SAP application could share data with an employee benefits application at a charity. Reservation systems at hotels and airlines can share data amongst a dozen unrelated systems in a single transaction. Speak to a EADH database expert about your case and the systems involved before key evidence is missed.
Types of Database Applications Suitable for Forensic Examination
· Oracle Databases – including Oracle Financials
· MySQL, PostgreSQL. MS SQL Server
· IBM Mainframes (IMS, DB2 Etc.)
· XML, Access, DBX
· Windows, Unix/Linux, OSX
· Enterprise Resource Planning or ERP Systems
· Sage and Microsoft Financials
· Accounting Applications
· Midrange Systems (Stratus and HP)
· Small Business Management Systems
· Credit Card Processing Systems
· SAP and PeopleSoft
· SAS/Cloud Applications
· Data Warehouse and Business Intelligence
· Accounting Systems
· Supply Chain and Inventory Management
· Cash Management and Treasury Management
· Engineering and Architectural Management
· Airline and Hotel Reservations
· Healthcare Management and Hospital Systems
· FDA Regulated Systems
· Search Engines and Knowledge Management Systems
· Source Code Repositories
· Custom Business Applications

What Types of Information Can Be Discovered?

Sources of extremely valuable information can be, and routinely are, overlooked. In intellectual property cases, for example, financial databases may be very important for damages, but knowledge management systems, source code repositories and document management systems can yield amazing insight into an alleged infringement, while helping defendants protect against troublesome fishing expeditions, and/or invalidate claims against them. These specialized databases can be used to review document lifecycle and versioning. Even extended metadata, like keywords, descriptions, annotations and comments, can give insight to the purpose of a document, reveal who authored or accessed information, and expose to where it was routed. In the hands of a highly trained and perceptive expert, a new view of the available data may also be achieved. Whether you’re producing a database or requesting it, you need the assistance of a court-tested and proven group of experts like ours at EADH.

Database forensics come into play during Intellectual Property (IP) or patent infringement cases, corporate espionage and even intrusion events like a data breach or an instigated virus infection. Often it’s in the structured ESI of a database where a savvy database forensics expert will find the evidence that will make or break a case. And should a database forensic examination lead outside of the database to computers, such as desktops and laptops, or digital devices like phones, tablets and pads, or even into a cloud computing/storage system, EADH can continue the hunt for data without missing a step.
Regulatory Compliance

Whether you are a hospital dealing with the Health Insurance Portability and Accountability Act (HIPAA), or a financial institution bound by Sarbanes-Oxley compliance (SOX) or even a retailer forced to comply with the Payment Card Industry Data Security Standard (PCI DSS compliance), there can be severe consequences if missteps are taken. EADH has worked on thousands of cases in a plethora of industries, and we’re completely conversant with regulatory procedures and acting within them. Further, we have legal advisement support staff at all of our locations and assigned to every case.

GPS and Other Digital Forensics: We are one of the few companies in the world that does forensic investigations for GPS devices and other digital devices likes mart watches, pagers, etc.

 

Our Scope of area we offer Training

Digital Forensics

1. computer Forensics,
2. mobile ( Cellebrite, MPE+ and OXYGEN Forensics Suite) and other digital media forensics
3. Hands on practice with tools like FTK, EnCase v7, Cellebrite)
4. JTAG, Chip-Off Forensics (we target govt. personnel)

IT Security

1. Data Security & Loss Prevention,

2. IT Governance & Risk Management,

3. Incident Response,

4. Introduction to disaster data recovery,

5. Compliance Governance)

6. VAPT (internal, external and web application testing)

© 2015 East African Data Handlers (K) LTD. All rights reserved.