
Live Security Incident Response
Incident Response is a set of procedures for an investigator to examine a computer security incident. This process involves figuring out what has happened and preserving information related to those events. A live security response is conducted when a computer system is still powered on and running. This means that the information contained in these areas must be collected without impacting the data on the compromised device.

In the event of any attackers/intrusion (Cyber crime/digital crimes) happen, OGITFS provide in depth security incident investigation :
✔ Containment Of A Security Incident
✔ Eradication of the security incident
✔ Recovery of the security incident
✔ Recommendation for improvement