
Computer Forensics
Data recovery: Retrieving deleted or corrupted data from storage devices.
Analysis of digital evidence: Examining files, emails, logs, and other data to identify potential evidence.
Tracking user activity: Investigating what actions were taken on a system, such as browsing history, file access, and communication.
Incident response: Responding to security breaches and figuring out how an attacker gained access to a system.