shutterstock 9311 TEST SIZE V3 051016

 

 "Fast Response Times and Resolutions."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give TWINTEL Solutions a call at (888) 894-6411.

Is Your Cloud Solution Actually a Money Pit?
Monitoring and Automation Make for a More Secure S...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Google Mobile Devices Data VoIP Microsoft Business Disaster Recovery Internet bgc Software communications roundup Business Continuity Email nonprofit Outsourced IT Innovation User Tips Managed IT Services Alert IT Services Smartphones Hardware Data Backup Productivity Tech Term Browser Windows 10 Managed IT Services Data Recovery Cloud Computing Smartphone Ransomware Computer Efficiency Server Saving Money Cybercrime Android Internet of Things Workplace Tips IT Support Communication Computers Business Management Small Business IT Support Network BDR Miscellaneous Passwords Quick Tips Artificial Intelligence Save Money Productivity Cybersecurity Office Windows Mobile Device Mobility Recovery Windows 10 Router Gadgets Mobile Device Management Holiday Money Social Engineering Applications Telephone Systems Managed IT BYOD Chrome Firewall Upgrade Law Enforcement Proactive IT Hacking Facebook Wi-Fi Private Cloud Work/Life Balance Vulnerability Virtualization Office 365 Collaboration Automation Health Social Media Phishing VPN Information Google Drive App Two-factor Authentication Bring Your Own Device Password Bandwidth Office Tips Avoiding Downtime Remote Monitoring Word How To Managed Service Provider Compliance Data Protection Budget Flexibility Microsoft Office Apps Voice over Internet Protocol Data Breach Keyboard Software as a Service Information Technology Connectivity Remote Computing Data Security Servers History Encryption Managed Service Black Market Identity Theft Settings Sports Business Intelligence Scam Operating System Mobile Computing Value HaaS Redundancy Save Time Spam Safety Machine Learning Cleaning Computing Infrastructure Solid State Drive Training Workers USB IT Management Data Management Marketing CES The Internet of Things Computer Care Battery Hacker Content Filtering Comparison Entertainment IT Plan Patch Management Content Management Update OneNote Physical Security Business Owner Samsung Emergency Access Control Charger Big Data Blockchain Virtual Assistant WiFi Document Management Credit Cards End of Support Electronic Medical Records Data storage Legal HIPAA Human Resources Telephone System Google Docs Wireless Technology Windows 7 Worker Fraud Risk Management YouTube Employer-Employee Relationship Infrastructure Paperless Office Telephony Unified Threat Management Spam Blocking Unsupported Software Data Storage Website Automobile Government SaaS PDF Hiring/Firing Security Cameras Password Manager Skype Cables Windows 10s Hosted Computing Remote Worker Software Tips Smart Technology Network Congestion Relocation Audiobook Amazon Web Services How to Files Digital Signature Help Desk Cache Net Neutrality Cryptocurrency Meetings Worker Commute Warranty Excel Employer Employee Relationship Remote Work webinar Botnet Business Mangement HVAC Start Menu Unified Communications Public Cloud Inventory Wiring Two Factor Authentication Video Games Humor Vendor Management Online Shopping Troubleshooting Laptop Multi-Factor Security IBM Chromecast Shortcuts Wireless Internet Scalability Apple Experience ISP Safe Mode Data loss Assessment Devices Printer Tip of the week Computer Accessories Conferencing Smartwatch Gmail Networking Tools Theft Education Internet Exlporer HBO Specifications IT Consultant Wire Flash Evernote Touchpad Accountants MSP Trending Supercomputer Social Cortana iPhone Screen Mirroring Television CrashOverride Techology NarrowBand Microchip Thought Leadership Mouse Windows Server 2008 Bluetooth Netflix Employee Recycling Enterprise Content Management Audit Authentication Outlook Millennials Leadership Google Apps Smart Office Sync Wireless Charging Shadow IT User Error Books File Sharing Data Warehousing Transportation Lifestyle Current Events Vendor Downtime Instant Messaging Going Green Cast Public Computer Wireless Search Engine Twitter Administrator Digital Signage eWaste Password Management Mobile Loyalty Computer Fan Reputation Users Advertising Nanotechnology Camera Workforce Fiber-Optic Monitor Colocation Hosted Solution Practices Augmented Reality Benefits Knowledge Best Practice Content Hard Drives Display Regulations Rootkit Amazon Robot Search Staff Regulation Bing Addiction Politics Google Search Criminal NIST Professional Services FENG Customers Virtual Reality Smart Tech Printers Frequently Asked Questions Telecommuting Congratulations GDPR E-Commerce nonprofits Thank You