Notification icon
Aktuálně evidujeme fibercut mezi uzly Praha-UMG Krč a Vestec-BIOCEV. Situaci řešíme s dodavatelem vláken.

FLAB Event analysis

Analyzing incidents that have already occurred.

Extra ServicesExtra Services
Illustrative image
More information

Basic features

The initial steps of analysis (securing data) should begin promptly upon detecting a security incident, as electronic traces can degrade over time, with some becoming undetectable within hours to days, though others may persist for weeks to months.

A typical analysis process follows these steps:

  • An initial consultation;
  • Formulating pertinent questions to address;
  • Providing support in securing the necessary data;
  • Analyzing the incident's progression;
  • Uncovering answers to formulated questions;
  • Documenting the entire process and presenting findings in a final report.

The goal of the analysis is to address specific customer inquiries, such as:

  • Whether a particular document currently exists or existed on the device.
  • Whether specific applications are or were installed on the device.
  • Whether documents have been altered, and other related inquiries.
  • FLAB team boasts long-term experience and independence in the security field
  • They leverage self-developed tools and services tailored for robust security solutions
  • Supported by CESNET e-Infrastructure and CESNET-CERTS team, they offer advanced technological support

The service is priced based on a separate calculation and proposal. The scope of the service is determined after an initial free consultation. This consultation results in an assignment, which is then used to prepare a quotation and offer for the Forensic Laboratory services.

Didn't find what you were looking for?