094 90 48200     Get SUPPORT

Aniar IT Services Blog

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give Aniar IT Services a call at 094 90 48200 .

Is Your Cloud Solution Actually a Money Pit?
Monitoring and Automation Make for a More Secure S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Email Cloud Business Computing Data Backup Microsoft Hackers Innovation Network Security Internet VoIP Data Malware Data Recovery User Tips Hardware Mobile Devices Workplace Tips Communication Cloud Computing Browser Android How To Small Business Internet of Things Artificial Intelligence Backup Smartphones IT Services Managed IT Services Windows 10 Communications Computer Computers Chrome Software Windows Network Cybercrime Collaboration Applications Saving Money Cybersecurity Smartphone Two-factor Authentication Data Security Passwords Data Protection Server Hosted Solutions Efficiency Word Ransomware Information Gadgets Router Vulnerability Office 365 Money Connectivity Business Management IT Support Miscellaneous BDR Business Spam Outsourced IT Facebook Business Continuity Mobile Device Management Remote Monitoring VPN Windows 7 IT Plan Settings Password Managed IT services OneNote Virtualization Redundancy Blockchain Telephone Systems Unsupported Software Data Storage Social Engineering Avoiding Downtime Apps Phishing Microsoft Office Spam Blocking Comparison Identity Theft Virtual Assistant Productivity Bring Your Own Device Website Operating System Managed Service IT Management Law Enforcement Save Money Paperless Office App Sports Managed IT Upgrade Scam BYOD CES Fraud Encryption Update Social Media Business Intelligence Telephone System Infrastructure Keyboard Content Management HVAC Root Cause Analysis Amazon Computer Care Private Cloud File Sharing eWaste Thought Leadership Disaster Recovery Wi-Fi Outlook Government Cast Bandwidth Skype Machine Learning Printer Staff Travel Remote Work Cryptocurrency Charger Hosted Computing Voice over Internet Protocol Mobile Computing Wireless Internet Amazon Web Services Accountants Augmented Reality Patch Management Public Cloud Training Legal Automation Tools Work/Life Balance Frequently Asked Questions Recovery Password Manager Nanotechnology Start Menu YouTube Mouse Safe Mode Data loss Wireless Charging Inventory Sync Multi-Factor Security Smart Office Computer Fan HIPAA USB Millennials Networking Holiday The Internet of Things Remote Worker Software Tips Criminal Excel Business Mangement Smart Tech Digital Signature Cortana Alert Google Apps Mobile Device Document Management FENG Camera Electronic Medical Records Wire Value Workforce Enterprise Content Management Online Shopping Big Data Flash Google Docs Wiring Addiction PDF Tip of the week Gmail Specifications Credit Cards Workers Access Control Telephony Trending Data Management Password Management Meetings Evernote Cleaning HaaS Solid State Drive Firewall Downtime Windows Server 2008 Windows 10s MSP Google Drive Recycling Devices Servers HBO Screen Mirroring Authentication Entertainment Warranty Human Resources Botnet Telecommuting Employer-Employee Relationship NIST Practices Audit Unified Threat Management Physical Security Cache Public Speaking Emergency Compliance Presentation Lithium-ion battery Hard Drives Wireless Technology 5G Regulation Tech Support Search IBM Quick Tips Safety Productivity WiFi Twitter Marketing Hacker Budget Company Culture CrashOverride Customer Relationship Management Competition IP Address Users Managed Service Provider Managing Stress Customer Service Printers Hiring/Firing Mobile Office Domains Fun Wireless Windows 10