(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give Network Management Services a call at (707) 268-8850.

Does Outsourcing Your Business’ Network Security M...
Monitoring and Automation Make for a More Secure S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Hosted Solutions Mobile Devices VoIP Google Email Data Recovery Tech Term Data Outsourced IT IT Support Saving Money Internet of Things Internet Microsoft Cloud Computing IT Services Software Efficiency Communications Hardware BDR Business Continuity Cybersecurity Ransomware Smartphones Business Cybercrime Communication Small Business Artificial Intelligence User Tips Server Disaster Recovery Android How To Browser Network Avoiding Downtime Computers Save Money Managed IT Services Smartphone Managed IT Windows Alert Gadgets Windows 10 Data Security Data Protection Router BYOD Miscellaneous Vulnerability Applications Social Media Money Business Management Mobile Device Management Two-factor Authentication Workplace Tips Computer Chrome Passwords Phishing Social Engineering Firewall Law Enforcement Mobility Productivity Business Intelligence Collaboration Productivity Redundancy Operating System Document Management Bandwidth Virtualization Office 365 Connectivity Proactive IT Upgrade Facebook IT Support Spam VPN Word Managed Service Provider Flexibility Compliance Private Cloud Telephone Systems Identity Theft Blockchain Budget Remote Monitoring Work/Life Balance Analysis Data storage Big Data Virtual Assistant Website Data loss Infrastructure OneNote Value Comparison IT Management Networking Windows 7 Hacking Sports Bring Your Own Device Unified Threat Management Windows 10 Office Tips IT Plan Physical Security CES Update Automation Mobile Device Wi-Fi Government Information App Encryption Unsupported Software Access Control Servers Training Workers Google Drive Solid State Drive Content Management Paperless Office Data Storage File Sharing Holiday Smart Tech Managed Service Settings Password Mobile Computing Apps Quick Tips Spam Blocking Public Cloud Business Owner Data Breach Employer-Employee Relationship Microsoft Office Information Technology Content Filtering Credit Cards Hosted Solution Google Apps Content Filter Mobile Samsung Knowledge Wireless Charging Nanotechnology Windows 10s Charger Emails Hybrid Cloud Human Resources Healthcare Data Warehousing Voice over Internet Protocol Remote Work Conferencing Customer End of Support Camera Education eWaste Wire Hard Drives iPhone NIST Legal Risk Management Fraud Practices Windows Server 2008 Recovery Storage Professional Services Accountants HBO Electronic Medical Records Network Congestion Monitor History Fiber-Optic Sync Save Time Staff Electronic Health Records Multi-Factor Security Telephone System Internet exploMicrosoft Criminal Screen Mirroring Software as a Service Cryptocurrency Amazon Hosted Computing Password Manager CrashOverride Tools HaaS Outlook Specifications IT Consultant Cables Devices Audit Telephony Office Digital Signature Machine Learning Trending Supercomputer Cortana Inventory Regulations Advertising Smart Office Cast Emergency Safe Mode HIPAA Amazon Web Services User Error MSP Business Mangement Addiction Downtime SaaS HVAC Entertainment IoT Frequently Asked Questions Millennials Leadership USB Unified Communications Thought Leadership Computer Fan Skype Cleaning Netflix Relocation YouTube Lifestyle Colocation Online Shopping Augmented Reality Patch Management Hiring/Firing Health Wireless Technology Remote Worker PDF Black Market Gmail Cache Root Cause Analysis Botnet Enterprise Content Management Excel Workforce Theft Streaming Media FENG Start Menu Computer Care IBM Humor Data Management Strategy Software Tips Current Events Safety Computing Infrastructure Keyboard Evernote Authentication Flash The Internet of Things Students Google Docs Scam Marketing Hacker Files Business Technology webinar Reputation Internet Exlporer Wiring Recycling Wireless Internet Meetings Travel Apple Password Management Insurance Tip of the week Telecommuting Proactive How to Customer Relationship Management Techology Managing Stress Competition Administration Remote Computing Experience Transportation IP Address Books Television Users Remote Monitoring and Maintenance Customer Service Search Content Scalability Music Webinar Benefits Mobile Office Worker Domains Printers Public Computer Best Practice Politics Line of Business Shadow IT Twitter Loyalty Audiobook Wireless Regulation Wearable Technology IT solutions Smart Technology Rootkit Public Speaking Virtual Reality Employer Employee Relationship Presentation Automobile Lithium-ion battery Worker Commute WiFi 5G Tech Support Computer Accessories Instant Messaging Troubleshooting Fun Company Culture Two Factor Authentication Vendor Management Video Games Bluetooth Battery Assessment