COMPUTER FORENSICS
Our rich experience makes us a reliable and professional partner in a wide variety of forensic procedures ranging from personal computers and mobile phones to cloud computing, etc.
Loading...
Thanks to our many years of experience, we offer a wide range of high-quality professional SERVICES that can be specifically tailored to suit your needs!
COMPUTER FORENSICS
Our rich experience makes us a reliable and professional partner in a wide variety of forensic procedures ranging from personal computers and mobile phones to cloud computing, etc.
FORENSIC RESPONSE ASSISTANCE
In the event of an incident, we can assist with the initial emergency measures necessary to prevent further damage, as well as to properly secure evidence.
SECURITY ANALYSIS
Are you familiar with the state of your IT security? Do you want to find out whether you are prepared and will respond appropriately in the event of an incident?
INFORMATION SECURITY CONSULTANCY
If you need advice or assistance in data security, personal data protection, establishing adequate security policies or reviewing internal acts for suitability, you can count on us to provide quality consultancy services.
OTHER SERVICES
We also offer a number of other services, such as video and audio forensics, special device forensics (drones, CNC machines, etc.) and others.
Computer forensics is the process of the identification, protection, analysis and presentation of evidence in digital form in a manner that is legally acceptable.
The Institute for Forensics of Information Technology (iFIT) has many years of experience in computer forensics.
It was one of the leading actors in the introduction of the basic forensic principles and the basic requirements for appropriate forensic procedures into Slovenian legislation.
Our services can help you address various problems:
- Independent and secure handovers (of IT data)
- Information leakage
- Information system intrusions
- Insurance fraud attempts
- Recovery of deleted data
- Disloyal employees
- ...
Taking action quickly and, above all, legally is essential when a harmful activity is detected.
Our team will help you quickly and effectively prevent further damage and secure the key evidence necessary for further proceedings. Even when you are at a remote location or if action needs to be taken at a separate unit (including abroad), our experts will be able to deliver the necessary support remotely or on-site with the assistance of local partners.
Do you want to evaluate your existing security and preparedness system in terms of a proper forensic response to incidents?
Or do you want to implement an adequate level of security and proper first emergency measures in case of an incident?
The Institute for Forensics of Information Technology can deliver all of the above. We will examine the state of your information security, personal data protection and appropriate organisational measures. We will also provide assistance and advice in upgrading your existing measures and activities or help you establish adequate policies and organisational measures, and give advice on how to increase your organisation’s level of security.
Thanks to our long experience in computer forensics, professional analysis and proper forensic responses, as well as assistance in eliminating the consequences of various incidents and taking action to prevent them, we are one of the most competent partners to provide support with any kind of issue relating to the detection, analysis and prevention of a wide range of criminal offences and other incidents concerning computer forensics.
If you have encountered an incident, have fallen victim to an incident or if you just want to prevent an incident from occurring, then do not hesitate to contact us for an appointment or assistance. We will help you analyse your situation, prepare suitable internal acts, make appropriate arrangements regarding your business and provide instructions for a proper response in the event of certain incidents.
Our range of services also includes special device forensics, i.e. CNC machines, specialised devices and robots involved in production processes, smart home appliances, drones, etc.
We can also offer assistance with a number of services related to video and audio recordings, e.g. authenticity examinations, the identification of people, etc.
Computer forensics is a very young science compared to other forensic disciplines. Nevertheless, it is crucial that all forensic scientists adhere to certain basic principles, such as legality, professionalism, traceability, integrity and custody. It is also important that they follow the steps indicated below.
At the data analysis stage, all the collected digital data is thoroughly and systematically analysed and evaluated. After excluding any irrelevant data, all the relevant data that could be used as evidence in further proceedings is appropriately secured for presentation in the final stage of the forensic cycle. At this stage, our forensic scientists ensure that their activities are properly recorded, either in minutes or in special reports in the applications that they use for work.
Data collection is the next stage when our forensic scientists gather all the relevant digital data from all the potential data carriers or locations involved in the investigation. Of course, the data types differ from one case to another. It could be data from a mobile phone or computer, or a whole host of other data types, e.g. server and firewall logs, user settings, network directory data, OS configuration, etc. This is another stage when it is crucial that our forensic scientists ensure the proper recording of the entire data collection process in the minutes. In this case as well, there must be adequate traceability provided via a chain of custody regarding the use of any data copied to other data carriers. This is essential when proving an information leak during an investigation, as well as when proving a manipulation of data during an investigation, and in the ensuing lawsuits.
The protection of data is the next crucial stage, which often needs to be carried out very quickly, sometimes even during the first stage. Its primary purpose is to secure all relevant data from being destroyed, damaged or modified. This stage often comprises various activities designed to physically protect data carriers, as well as a host of activities for securing digital data, particularly when the protection of physical data carriers is not possible or sensible (e.g. application servers, etc.). Our forensic scientists ensure that the entire process of the protection of data and, above all, physical data carriers, is properly recorded in the minutes. In cases where data carriers are seized, the process is additionally secured with a chain of custody to ensure the traceability of data use at all times. This is essential when proving an information leak during an investigation, as well as when proving a potential manipulation of data during an investigation, and in the ensuing lawsuits.
The presentation of a forensic investigation’s results is the final stage of the forensic cycle. It can be done either through the preparation of relevant scientific/expert opinions or in the form of testimony in court or, alternatively, the results can be presented to the client orally. In the final stage, all the relevant documentation, digital data, carriers of original data and other items are handed over to the client. If the client no longer wants certain data, our experts will ensure that all the client data is securely deleted.
Identification is the first stage in a forensic investigation. At this stage, our experts collect the initial basic information needed to legally and professionally carry out the forensic tasks that have been requested and agreed on. This stage takes place in close cooperation with the client, by conducting interviews, carrying out site visits, etc. in order to acquire relevant information about all potential sources of data that could serve as relevant evidence for further proceedings.
Documenting the procedures is a vital process that runs throughout the forensic investigation. Proper and, above all, accurate documentation of the procedures ensures the traceability and, most importantly, the repeatability of the forensic investigation in the event of a verification of the investigation’s findings. When this stage is appropriately taken into account throughout the forensic cycle, any other investigator should get the same results when performing a verification. If these procedures are not properly documented, however, it can happen that certain results of the investigation cannot be confirmed, or the origin or even the authenticity of the data cannot be confirmed, which raises doubts about the presented results and may even lead to the exclusion of submitted evidence.
We are fully aware of the importance of working professionally and in compliance with the law, as using the wrong approach could, in addition to the exclusion of the evidence in further proceedings, lead to a claim for damages. We are especially proud of the fact that we have helped establish certain minimum forensic standards in Slovenia and participated in the introduction and observance of some basic forensic principles through our many years of work and expertise, as well as through various lectures, training and support in drafting individual legal norms under procedural laws.
RELIABLE PARTNER
Thanks to our many years of professional and, above all, legal work, iFIT is considered a safe and reliable partner in both domestic and foreign markets.
CONSTANT CUSTOMER CARE
Our professional TEAM is always working to ensure our clients get a complete solution, as well as relevant advice throughout the business process.
EXTENSIVE KNOWLEDGE OF LEGISLATION
Many years of work in computer forensics places iFIT among the institutions that have been active in this field from the very beginning and through to the present boom in information technology use.
We boast extensive experience in various fields of information technology forensics.