{"id":3001,"date":"2023-03-31T16:52:52","date_gmt":"2023-03-31T09:52:52","guid":{"rendered":"https:\/\/htiservices.vn\/?post_type=portfolio&#038;p=3001\/"},"modified":"2023-03-31T16:55:06","modified_gmt":"2023-03-31T09:55:06","slug":"computer-forensic","status":"publish","type":"portfolio","link":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/","title":{"rendered":"Computer forensic"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row wrap_container=&#8221;yes&#8221; el_class=&#8221;dvu01&#8243;][vc_column][vc_row_inner][vc_column_inner][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1824\" src=\"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/dieu-tra-may-tinh-hti-services-300x200.jpg\" alt=\"Computer forensic\" width=\"800\" height=\"534\" srcset=\"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/dieu-tra-may-tinh-hti-services-640x427.jpg 640w, https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/dieu-tra-may-tinh-hti-services-400x267.jpg 400w, https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/dieu-tra-may-tinh-hti-services-367x245.jpg 367w, https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/dieu-tra-may-tinh-hti-services.jpg 740w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;tieude-left&#8221;]<\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-size: 26px;\"><strong>Computer forensic<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\">Computer forensics is a field of technology that uses investigative techniques to identify and store evidence from a computer device. Often, computer forensics is used to uncover evidence that could be used in a court of law. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.<\/p>\n<p style=\"text-align: justify;\">Enterprises can use computer forensics to track information related to a data breach to determine the cause of the problem and take further action.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-size: 26px;\"><strong>Data acquisition from storage devices (HDD, SSD, USB Flash Disk, etc.)<\/strong><\/span><\/h2>\n<ul style=\"text-align: justify;\">\n<li>Gathering storage device(s)<\/li>\n<li>Imaging the storage device<\/li>\n<li>Copying the image file to the encrypted storage device (Bitlocker)<\/li>\n<li>Send the storage device(s) to customer<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-size: 26px;\"><strong>Data analysis (storage devices)<\/strong><\/span><\/h2>\n<ul style=\"text-align: justify;\">\n<li>Basic analysis on the system based on the provided key words<\/li>\n<li>Timeline analysis<\/li>\n<li>System analysis<\/li>\n<li>Remote connection analysis<\/li>\n<li>Analysis on commonly used data<\/li>\n<li>Analysis as per client&#8217;s requirement<\/li>\n<li>Detailed reporting<\/li>\n<li>Copying data and report to the encrypted HDD (Bitlocker)<\/li>\n<li>Sending the HDD to customer<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-size: 26px;\"><strong>Data recovery (storage devices)<\/strong><\/span><\/h2>\n<ul>\n<li style=\"text-align: justify;\">Data recovery on HDD<\/li>\n<li style=\"text-align: justify;\">Data recovery on SSD<\/li>\n<li style=\"text-align: justify;\">Data recovery USB Flash Disk<\/li>\n<li style=\"text-align: justify;\">Data recovery on Memory Card<\/li>\n<li style=\"text-align: justify;\">Data recovery on Server<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;100&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row wrap_container=&#8221;yes&#8221; el_class=&#8221;dvu01&#8243;][vc_column][vc_row_inner][vc_column_inner][vc_column_text] [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_column_text css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;tieude-left&#8221;] Computer forensic Computer forensics is a field of technology that uses investigative techniques to identify and store evidence from a computer device. Often, computer forensics is used to uncover evidence that could be used in a court of law. The goal of computer forensics is to examine digital media [&hellip;]<\/p>\n","protected":false},"featured_media":2071,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"portfolio_cat":[321],"portfolio_skills":[647],"class_list":["post-3001","portfolio","type-portfolio","status-publish","has-post-thumbnail","hentry","portfolio_cat-dich-vu-en","portfolio_skills-computer-forensic"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Computer forensic - htiservices.vn<\/title>\n<meta name=\"description\" content=\"Analyze and investigate computer data to make logical inferences about the causes and explanations of phenomena and situations in problem solving.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer forensic - htiservices.vn\" \/>\n<meta property=\"og:description\" content=\"Analyze and investigate computer data to make logical inferences about the causes and explanations of phenomena and situations in problem solving.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/\" \/>\n<meta property=\"og:site_name\" content=\"htiservices.vn\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-31T09:55:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"802\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/computer-forensic\\\/\",\"url\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/computer-forensic\\\/\",\"name\":\"Computer forensic - htiservices.vn\",\"isPartOf\":{\"@id\":\"\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/computer-forensic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/computer-forensic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/data-breach.webp\",\"datePublished\":\"2023-03-31T09:52:52+00:00\",\"dateModified\":\"2023-03-31T09:55:06+00:00\",\"description\":\"Analyze and investigate computer data to make logical inferences about the causes and explanations of phenomena and situations in problem solving.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/computer-forensic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/computer-forensic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/computer-forensic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/data-breach.webp\",\"contentUrl\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/data-breach.webp\",\"width\":1200,\"height\":802,\"caption\":\"\u0111i\u1ec1u tra n\u1ed9i b\u1ed9 v\u1ec1 r\u00f2 r\u1ec9 d\u1eef li\u1ec7u\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/dich-vu\\\/computer-forensic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Trang ch\u1ee7\",\"item\":\"https:\\\/\\\/htiservices.vn\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer forensic\"}]},{\"@type\":\"WebSite\",\"@id\":\"\\\/#website\",\"url\":\"\\\/\",\"name\":\"HTI Services\",\"description\":\"htiservices.vn\",\"publisher\":{\"@id\":\"\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"\\\/#organization\",\"name\":\"HTI Services\",\"url\":\"\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/htiservices.vn\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/logo-1.svg\",\"width\":110,\"height\":48,\"caption\":\"HTI Services\"},\"image\":{\"@id\":\"\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer forensic - htiservices.vn","description":"Analyze and investigate computer data to make logical inferences about the causes and explanations of phenomena and situations in problem solving.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/","og_locale":"en_US","og_type":"article","og_title":"Computer forensic - htiservices.vn","og_description":"Analyze and investigate computer data to make logical inferences about the causes and explanations of phenomena and situations in problem solving.","og_url":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/","og_site_name":"htiservices.vn","article_modified_time":"2023-03-31T09:55:06+00:00","og_image":[{"width":1200,"height":802,"url":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/","url":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/","name":"Computer forensic - htiservices.vn","isPartOf":{"@id":"\/#website"},"primaryImageOfPage":{"@id":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/#primaryimage"},"image":{"@id":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/#primaryimage"},"thumbnailUrl":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp","datePublished":"2023-03-31T09:52:52+00:00","dateModified":"2023-03-31T09:55:06+00:00","description":"Analyze and investigate computer data to make logical inferences about the causes and explanations of phenomena and situations in problem solving.","breadcrumb":{"@id":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/#primaryimage","url":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp","contentUrl":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/08\/data-breach.webp","width":1200,"height":802,"caption":"\u0111i\u1ec1u tra n\u1ed9i b\u1ed9 v\u1ec1 r\u00f2 r\u1ec9 d\u1eef li\u1ec7u"},{"@type":"BreadcrumbList","@id":"https:\/\/htiservices.vn\/en\/dich-vu\/computer-forensic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Trang ch\u1ee7","item":"https:\/\/htiservices.vn\/en\/"},{"@type":"ListItem","position":2,"name":"Computer forensic"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"HTI Services","description":"htiservices.vn","publisher":{"@id":"\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/#organization","name":"HTI Services","url":"\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/#\/schema\/logo\/image\/","url":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/07\/logo-1.svg","contentUrl":"https:\/\/htiservices.vn\/wp-content\/uploads\/2022\/07\/logo-1.svg","width":110,"height":48,"caption":"HTI Services"},"image":{"@id":"\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio\/3001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio"}],"about":[{"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/types\/portfolio"}],"version-history":[{"count":0,"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio\/3001\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/media\/2071"}],"wp:attachment":[{"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/media?parent=3001"}],"wp:term":[{"taxonomy":"portfolio_cat","embeddable":true,"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio_cat?post=3001"},{"taxonomy":"portfolio_skills","embeddable":true,"href":"https:\/\/htiservices.vn\/en\/wp-json\/wp\/v2\/portfolio_skills?post=3001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}