Female Rep2

 

 "Real People, Real Solutions"

Have IT Questions?
Call us now (888) 894-6411

Blog

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give TWINTEL Solutions a call at (888) 894-6411.

Is Your Cloud Solution Actually a Money Pit?
Monitoring and Automation Make for a More Secure S...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Network Security Hackers Backup Malware Hosted Solutions Mobile Devices Microsoft Google VoIP Disaster Recovery bgc Email Data roundup nonprofit Software Managed IT Services Alert Business Continuity Innovation Internet Outsourced IT Business Smartphones communications Windows 10 Tech Term Hardware IT Services Saving Money Ransomware Data Backup Android Cybercrime Managed IT Services Browser Server Computer Computers Efficiency Internet of Things Cloud Computing Small Business IT Support Productivity Data Recovery Office Network Windows User Tips BDR Passwords Smartphone Quick Tips Save Money Business Management Telephone Systems Communication BYOD Applications Cybersecurity Miscellaneous IT Support Managed IT Recovery Artificial Intelligence Money Mobile Device Management Social Engineering Work/Life Balance Productivity Vulnerability Virtualization Workplace Tips Social Media Collaboration Hacking Upgrade Law Enforcement Facebook Phishing Gadgets Firewall Mobility Data Protection Wi-Fi Password Automation Health Holiday Office 365 Managed Service Provider Microsoft Office Remote Monitoring How To VPN Compliance Proactive IT Chrome Flexibility Budget Private Cloud Router Bring Your Own Device Bandwidth Office Tips Avoiding Downtime App Windows 10 Two-factor Authentication Mobile Computing Redundancy Safety Value Data Security HaaS Google Drive Information Technology Identity Theft Business Intelligence Remote Computing History Connectivity Black Market Mobile Device Apps Word Data Breach Operating System Sports Patch Management Unsupported Software Data storage Business Owner Data Storage Blockchain Website Virtual Assistant OneNote Wireless Technology Samsung Emergency Scam YouTube Charger Settings Big Data Document Management IT Management PDF Electronic Medical Records Government Legal Comparison Solid State Drive Infrastructure Paperless Office Computing Infrastructure Save Time IT Plan Marketing Worker HIPAA Servers Update Employer-Employee Relationship Risk Management The Internet of Things Unified Threat Management Spam Blocking Automobile Information CES Physical Security Hiring/Firing Credit Cards SaaS Cleaning Data Management Encryption Managed Service Training Workers USB Content Management Keyboard Windows 7 End of Support Entertainment Spam Computer Care Battery Content Filtering IBM Accountants MSP Vendor Management Troubleshooting Cortana Telephony Wire Fiber-Optic User Error Wireless Computer Accessories Conferencing Scalability Experience Regulations Thought Leadership Amazon Downtime Assessment Recycling Professional Services Enterprise Content Management Reputation Advertising Going Green IT Consultant Frequently Asked Questions Authentication Telecommuting Education Supercomputer Software Tips File Sharing Hard Drives Google Apps Skype Smart Office Cables Monitor Colocation Techology Human Resources Voice over Internet Protocol Telephone System Bluetooth Netflix Twitter Amazon Web Services Robot Television CrashOverride Meetings eWaste Software as a Service Password Management Customers Leadership Excel Nanotechnology Remote Work Camera Audit Transportation Current Events Practices Augmented Reality Relocation Shadow IT Books Start Menu Unified Communications Staff Multi-Factor Security Regulation Instant Messaging Addiction Online Shopping Files Public Computer Users Data loss Criminal NIST Tip of the week Smart Tech Loyalty Computer Fan Hacker Benefits Knowledge Best Practice Content HBO Hosted Computing Specifications Remote Worker Humor Hosted Solution Password Manager Tools Machine Learning Theft Digital Signature Trending Rootkit Search Flash Cache Evernote Virtual Reality Screen Mirroring WiFi Cryptocurrency Laptop Politics Windows Server 2008 Apple Chromecast FENG Internet Exlporer Smart Technology Network Congestion Audiobook Outlook Inventory Millennials Wiring Windows 10s Business Mangement HVAC Data Warehousing Lifestyle How to Sync Wireless Internet Wireless Charging Worker Commute Cast Google Docs Safe Mode Touchpad Employer Employee Relationship webinar Devices Fraud iPhone Mobile Networking Two Factor Authentication Video Games Access Control Workforce NarrowBand Public Cloud Gmail E-Commerce nonprofits Thank You Printers Congratulations GDPR