{"id":1157,"date":"2018-03-13T04:38:29","date_gmt":"2018-03-13T01:38:29","guid":{"rendered":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/?page_id=1157"},"modified":"2018-03-14T10:12:15","modified_gmt":"2018-03-14T07:12:15","slug":"computer-forensics","status":"publish","type":"page","link":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/computer-forensics\/","title":{"rendered":"Computer Forensics"},"content":{"rendered":"<!--[fluid]--><!--{content}-->    <!--[section]-->\n\t\t<style>\n.bd-section-2037850091{background-color:#0aa6ce;}\n.bd-section-2037850091{\n\ttext-align:  center;\n}\n<\/style>\t\t<section id=section33 class=\" bd-section-2037850091 bd-page-width  bd-tagstyles\" data-section-title=\"Section\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t<!--[image]--><style>\n.additional-class-1555341497{width:100%;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/computer-forensics.jpg\" alt=\"Computer Forensics, Information Security Management\" class=\" additional-class-1555341497   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n<!--{\/content}--><!--[\/fluid]-->\n    <!--[section]-->\n\t\t\t\t<section id=section5 class=\" bd-section-469066137  bd-tagstyles\" data-section-title=\"\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t    <!--[columns]-->\n        <style>\n.bd-layoutcontainer-1184045067 > .bd-container-inner > .container-fluid > .row{height:100%;margin:0px;}\n.bd-layoutcontainer-1184045067 > .bd-container-inner > .container-fluid > .row > div{padding:0px;}\n.bd-layoutcontainer-1184045067  > .bd-container-inner > .container-fluid:after{display:none;}<\/style><style>\n.bd-layoutcontainer-1184045067 > .bd-container-inner > .container-fluid, .bd-layoutcontainer-1184045067 > .bd-container-inner > .container-fluid > .row{height:100%;}<\/style><style>.bd-layoutcontainer-1184045067 > .bd-container-inner > .container-fluid {padding-left: 0; padding-right: 0;}<\/style>        <style>\n.bd-layoutcolumn-2131638200{background-color:#ffffff;min-height:250px;-webkit-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-o-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-ms-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-moz-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);margin:-4em 2em 2em;padding:2em;border-radius:20px;}\n@media (max-width: 767px) {.bd-layoutcolumn-2131638200{margin:-2em 1em 2em;}}<\/style>        <div class=\" bd-layoutcontainer-1184045067  bd-columns bd-no-margins\">\n            <div class=\"bd-container-inner\">\n                <div class=\"container-fluid\">\n                    <div class=\"row bd-row-flex bd-row-align-middle\">\n                        <!--{content}-->\n                                <!--[column]-->\n        <div class=\"col-lg-12 bd-columnwrapper-2131638200\">\n            <div class=\"bd-column  bd-layoutcolumn-2131638200  bd-no-margins\">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[html]--><style>\n.additional-class-530904624{padding-right:1em;padding-left:1em;}<\/style><style><\/style><div class=\"bd-tagstyles  additional-class-530904624 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h1>Computer Forensics<\/h1>\r\n<h5 style=\"text-align:center\"><b>Information Security Management<\/b><\/h5>\r\n\r\n<p>Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Main objectives are to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.<\/p>\r\n\r\n<p>Forensic investigators typically follow a standard set of procedures: After physically isolating the device in question to make sure it cannot be accidentally contaminated, investigators make a digital copy of the device's storage media. Once the original media has been copied, it is locked in a safe or other secure facility to maintain its pristine condition. All investigation is done on the digital copy.<\/p>\r\n\r\n<p>A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).<\/p>\r\n\r\n<p><b>Usage of Computer Forensics<\/b><\/p>\r\n\r\n<ul>\r\n<li>Intellectual Property theft<\/li>\r\n<li>Industrial espionage<\/li>\r\n<li>Employment disputes<\/li>\r\n<li>Fraud investigations<\/li>\r\n<li>Forgeries<\/li>\r\n<li>Bankruptcy investigations<\/li>\r\n<li>Inappropriate email and internet use in the work place<\/li>\r\n<li>Regulatory compliance<\/li>\r\n<\/ul>\r\n\r\n<p><b>Computer Forensics Tools<\/b><\/p>\r\n<ul>\r\n<li>Disk and data capture tools<\/li>\r\n<li>File viewers<\/li>\r\n<li>File analysis tools<\/li>\r\n<li>Registry analysis tools<\/li>\r\n<li>Internet analysis tools<\/li>\r\n<li>Email analysis tools<\/li>\r\n<li>Mobile devices analysis tools<\/li>\r\n<li>Mac OS analysis tools<\/li>\r\n<li>Network forensics tools<\/li>\r\n<li>Database forensics tools<\/li>\r\n\r\n<\/ul><!--{\/content}--><\/div><\/div><!--[\/html]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n                        <!--{\/content}-->\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/columns]-->\n\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2216,"parent":775,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1157"}],"collection":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/comments?post=1157"}],"version-history":[{"count":0,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1157\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media\/2216"}],"wp:attachment":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media?parent=1157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}