094 90 48200     Get SUPPORT

Aniar IT Services Blog

2 minutes reading time (467 words)

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give Aniar IT Services a call at 094 90 48200 .

Is Your Cloud Solution Actually a Money Pit?
Monitoring and Automation Make for a More Secure S...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Privacy Google Best Practices Business Computing Email Microsoft Cloud Tech Term Android Data Backup Small Business How To Hackers Cloud Computing User Tips Internet VoIP Network Security Communication Computers Chrome Malware Software Browser Innovation Cybercrime Collaboration Data Recovery Backup Internet of Things Artificial Intelligence Managed IT Services Hardware Cybersecurity Smartphone Data Security Data Windows Efficiency Data Protection Word Vulnerability Office 365 Ransomware Business Management Saving Money Business Smartphones Money Spam Connectivity Mobile Device Management Windows 10 Two-factor Authentication Communications Virtualization Passwords Content Management Windows 7 Managed IT services Unsupported Software VPN Redundancy Data Storage Apps Telephone Systems Social Engineering Spam Blocking Network Avoiding Downtime Phishing Comparison Bring Your Own Device Website Router Operating System IT Management Identity Theft App Upgrade Law Enforcement BYOD IT Services Managed IT BDR Facebook CES Business Intelligence Mobile Devices Update Outsourced IT IT Plan Remote Monitoring Business Continuity Infrastructure OneNote Disaster Recovery Cache Keyboard Computer Care Practices Machine Learning Skype eWaste Thought Leadership Public Cloud Outlook Amazon Government Password Voice over Internet Protocol Bandwidth Travel Staff Remote Work Server Data loss Tools Blockchain Work/Life Balance Wireless Internet Computer Fan The Internet of Things Patch Management Charger Hosted Computing Gadgets YouTube Start Menu Legal Automation Software Tips Microsoft Office Frequently Asked Questions Amazon Web Services Recovery Accountants Hosted Solutions Sync Password Manager Multi-Factor Security Nanotechnology Smart Office Cortana Alert HIPAA Millennials USB FENG Big Data Wireless Charging Inventory Criminal Excel Holiday Document Management Business Mangement Smart Tech Digital Signature IT Support Value Electronic Medical Records Workforce Wire Flash Google Apps Google Docs Mobile Device Meetings Social Media Specifications Addiction Solid State Drive Tip of the week Online Shopping Productivity Paperless Office Telephony Gmail Trending Windows 10s Google Drive Credit Cards PDF Downtime Scam Access Control Screen Mirroring Data Management Sports HaaS Workers Employer-Employee Relationship Applications Audit Physical Security Windows Server 2008 Evernote Cleaning Entertainment Recycling Devices Private Cloud Wi-Fi HBO Fraud Encryption Root Cause Analysis Authentication Settings Cast Botnet Human Resources Telecommuting Computer HVAC Emergency Augmented Reality Tech Support Wireless Technology 5G Hard Drives Safety Search IBM Marketing Workplace Tips Hacker Productivity Budget Competition CrashOverride Customer Relationship Management IP Address WiFi Users Company Culture Twitter Customer Service Miscellaneous Managed Service Provider Mobile Office Managing Stress Domains Hiring/Firing Wireless Fun Windows 10 Servers Public Speaking Presentation Lithium-ion battery