Data Analysis | Computer Analysis

The specialists of Kurtz IT Service keep their IT architecture, meaning software and hardware, consistently up to date with the latest state of the art. In this way, we are always prepared to respond to innovations in modern IT developments.

 

Digital traces are divided into user data and external access. Naturally, we do not involve ourselves in your sensitive activities, even though this is sometimes a major concern for our clients. Rest assured: we have absolutely no interest in viewing your personal data! Irrelevant findings in the area of sensitive data are neither addressed to you, nor stored, nor forwarded to third parties.

 

The Edathy case shows it clearly: the misuse of the internet is omnipresent and extends through all levels of society: child pornography, industrial espionage, misuse of work equipment for private purposes, fraud, sabotage and more. IT forensics is a growing field within criminal case analysis.

Network Cabling; Data Analysis, System Analysis by IT Expert, IT Specialist, IT Forensics

Search for Perpetrators in IT Attacks

In assignments within the commercial sector, as few employees of Kurtz IT Service as possible are naturally involved in the investigation process, in consultation with the respective management, in order to prevent subsequent trace concealment measures. The enemy often lurks within one’s own ranks. If necessary, our specialists will be introduced into your company under a credible cover.

 

Areas of application include, among others:

 

  • Identification of the perpetrator or perpetrators
  • Determination of the time of the offence
  • Determination of the extent of the offence
  • Determination of the motivation for the offence and
  • Determination of the cause and execution of the offence

 

Whether all points can be fully clarified depends primarily on the available data material.

 

Which components can our IT specialists analyse (an incomplete (!) selection):

 

  • Random access memory
  • Internal and external hard drives, including RAID composite systems
  • Memory cards and USB sticks
  • Optical storage media such as CDs, DVDs and Blurays
  • Network components such as routers and firewalls
  • Smartphones, navigation devices etc.
  • Digital cameras and video cameras
  • Optical and acoustic surveillance systems