We built a timeline of the actions taken by the hackers in the system.
The collection ,preservation and analysis of digital evidence extracted from electronic devices(Computer, Hard disk,Servers...)
The collection and analysis of digital evidence from mobile phones , Androids and ios devices.