(707) 268-8850    Get SUPPORT

Network Management Services Blog

Network Management Services has been serving the Eureka area since 1995, providing IT Support including technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give Network Management Services a call at (707) 268-8850.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 25 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Backup Malware Google VoIP Data Backup Hosted Solutions Email Outsourced IT IT Support Microsoft Software Mobile Devices Data Recovery Innovation Cloud Computing Business Continuity Internet Internet of Things Saving Money Business Ransomware Cybercrime Efficiency Data Communications Small Business BDR Tech Term IT Services Hardware Disaster Recovery Cybersecurity Android Browser Artificial Intelligence User Tips Server Managed IT Communication Computers Avoiding Downtime Smartphones How To Smartphone Alert Managed IT Services Collaboration Law Enforcement Business Intelligence Windows Money Business Management Router BYOD Social Engineering Chrome Phishing Mobile Device Management Two-factor Authentication Data Security Data Protection Mobility Vulnerability Document Management Compliance Private Cloud Upgrade Firewall Virtualization Social Media Save Money Connectivity Productivity Operating System Computer Windows 10 Passwords Proactive IT Telephone Systems Managed Service Provider Identity Theft Office 365 Remote Monitoring Word Spam Flexibility Bandwidth Redundancy Network VPN Budget Gadgets Physical Security Government Big Data Employer-Employee Relationship Update Miscellaneous Google Drive Workers Facebook Analysis Data Storage Public Cloud Windows 10 Office Tips Mobile Device Content Filtering Wi-Fi App CES OneNote IT Management Bring Your Own Device Content Management Windows 7 Information Technology Automation IT Plan Quick Tips Smart Tech Website Credit Cards Work/Life Balance Unsupported Software Data storage Servers Infrastructure Data Breach Solid State Drive Spam Blocking Value Data loss Networking Hacking Apps Comparison Business Owner Holiday Productivity Supercomputer Outlook Advertising Specifications Access Control Evernote Cache Telephony Audit Legal Hosted Solution Colocation Recycling Strategy SaaS Cast Frequently Asked Questions Recovery Millennials Authentication Wireless Charging Wireless Internet Skype Save Time Training Computer Fan Risk Management Computing Infrastructure eWaste Workforce Nanotechnology Current Events Excel Apple Fiber-Optic Wire Start Menu FENG Criminal HVAC Google Docs Accountants Telecommuting Knowledge Tip of the week Hybrid Cloud iPhone Cables Sports Emails Mobile Charger HIPAA Data Warehousing Cortana History Voice over Internet Protocol Remote Work Devices Network Congestion Windows Server 2008 Black Market Electronic Medical Records PDF Wireless Technology IBM Unified Communications Smart Office Professional Services Password Hacker Marketing Multi-Factor Security IoT Thought Leadership IT Consultant Data Management Microsoft Office Office Theft Paperless Office Tools Unified Threat Management Keyboard Emergency User Error Blockchain Trending Streaming Media Leadership Regulations Education Relocation Health Google Apps Students Netflix Cleaning Downtime Patch Management Lifestyle Insurance Fraud Content Filter Applications Humor Hard Drives Files Healthcare Settings Botnet Human Resources Computer Care Root Cause Analysis HaaS Software Tips Scam Monitor Internet Exlporer Reputation Mobile Computing Practices Amazon Storage webinar Flash Password Manager Electronic Health Records Travel Staff Samsung Meetings Workplace Tips End of Support Customer Hosted Computing Amazon Web Services Conferencing Entertainment USB Business Mangement Machine Learning Digital Signature HBO Internet exploMicrosoft Safety Inventory The Internet of Things Online Shopping Addiction IT Support Sync Hiring/Firing Gmail YouTube Windows 10s Software as a Service Encryption Screen Mirroring How to Smart Technology Competition Rootkit Fun Company Culture Users Best Practice Managing Stress WiFi Shadow IT Two Factor Authentication Wireless Vendor Management Politics Search Administration Assessment Presentation Books Enterprise Content Management Television Automobile 5G Webinar Video Games Password Management Public Computer Battery Customer Relationship Management IT solutions CrashOverride Techology Remote Computing IP Address NIST Employer Employee Relationship Customer Service Experience Scalability Mobile Office Domains Computer Accessories Content Music Public Speaking Virtual Reality Bluetooth Audiobook Wearable Technology Transportation Lithium-ion battery Twitter Worker Commute Augmented Reality Tech Support Instant Messaging Benefits Worker Troubleshooting Loyalty

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *