Computer Forensics Laboratory
  Main  "  Services  "  Case Studies  "  Tools  "  Contact Us  "  NISER

Our services

Due to the growth of incidents and complexities of data recovery and investigations, NISER is extending its computer forensics services to any organizations requiring such professional service. Stabilizing the involved computers, protecting and recovering the data evidence are the first concerns to protect the victim or client. The service includes:

� Disk imaging   � Evidence extraction  � File recovery
� Analysis         � Report

Our computer forensics specialist will take several careful steps to identify and attempt to retrieve possible evidence that may exist on a subject computer system. Based on three core foundations of computer forensics methodology, which are to collect, analyze and present, a variety of forensic explorations (PC hard disk analysis, deleted file reconstruction, historical/hidden/lost data restoration and discovery) can be held.

Collect

  • Protects the subject computer system during the forensic examination from any possible alteration, damage, data corruption, or virus introduction.
  • Discovers all files on the subject system. This includes existing normal files, deleted yet remaining files, hidden files, password protected files, and encrypted files.
  • Recovers all (or as much as possible) of discovered deleted files.

Analyze

  • Reveals (to the extent possible) the contents of hidden files as well as temporary or swap files used by both the application programs and the operating system.

  • Accesses (if possible and if legally appropriate) the contents of protected or encrypted files.

  • Analyzes all possibly relevant data found in special (and typically inaccessible) areas of a disk. This includes but is not limited to what is called 'unallocated' space on a disk (currently unused, but possibly the repository of previous data that is relevant evidence), as well as �slack' space in a file (the remnant area at the end of a file, in the last assigned disk cluster, that is unused by current file data, but once again may be a possible site for previously created and relevant evidence).

Present

  • Prints out an over all analysis of the subject computer system, as well as a listing of all possibly relevant files and discovered file data. Further, provides an opinion of the system layout, the file structures discovered, any discovered data and authorship information, any attempts to hide, delete, protect, encrypt information, and anything else that has been discovered and appears to be relevant to the overall computer system examination.



Disclaimers and copyright information