The process of investigating and analyzing systems or data that have been compromised or tampered with.