It is a fact that during the last decade security intrusions and incidents have been growing exponentially, painting a bleak picture on the safety of computing infrastructures. In this sense, organizations have doubled their efforts in bettering their security, installing different protection mechanisms and performing multiple tests in order to optimize the existing security conditions in each one of their business environments. Nevertheless, since absolute security does not exist, the margin for a new incident to occur is always present; thus, when it presents itself, organizations are put to the test, validating their ability to respond and deal with said incidents.
Computer forensics investigators, professionals with knowledge of technical computing issues, are individuals prepared to apply legal, technically valid, procedures to stablish evidence in situations where systems are violated o compromised, utilizing scientifically proven and clear methods and procedures to stablish possible hypotheses on the fact, and counting with the evidence needed to support these hypotheses.
- Computer crime investigations
- Financial frauds
- Support and creation of a Computer security incident response team – CSIRT
- Information recovery and preservation of digital evidence
- Secure file deletion
- Malware analysis
- Reverse engineering