Since many security
vulnerabilities in companies and authorities are exploited for attacks,
espionage and manipulation, there is a considerable need to clarify such
incidents. The seminars on the topic of IT forensics deal with procedures and
tools for the secure identification and evidence-based extraction of traces.
The spectrum of IT forensic tools is very broad. It ranges from the efficient
identification of certain contents in huge hard drive memories or online
storage services to live forensics and the analysis of mobile devices.