window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give TaylorWorks a call at 407-478-6600.

Does Outsourcing Your Business’ Network Security M...
Monitoring and Automation Make for a More Secure S...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Technology Cloud Best Practices Managed IT Services Privacy Network Security Business Computing Data Backup Email Hackers VoIP Malware Hosted Solutions Outsourced IT Data Recovery Tech Term Google Mobile Devices Microsoft Backup Data Software Cloud Computing Business Continuity Internet of Things Innovation Saving Money BDR Hardware Internet Cybersecurity IT Support Small Business Efficiency Android Ransomware Disaster Recovery Cybercrime Communications IT Services User Tips Smartphones Communication Network Managed IT Services Router Applications Gadgets Artificial Intelligence Law Enforcement Managed IT How To Business Mobile Device Management Productivity Virtualization IT Support Smartphone Two-factor Authentication Money Business Intelligence Business Management BYOD Collaboration Phishing Windows Browser Data Security Chrome Data Protection Avoiding Downtime Computers Facebook Spam Identity Theft Computer Word Telephone Systems Proactive IT Passwords Blockchain Bandwidth Alert Mobility Apps Analysis Productivity Document Management Windows 10 Vulnerability Social Engineering Compliance IT Management Redundancy Office 365 Connectivity Save Money App Social Media Remote Monitoring Windows 7 Spam Blocking Flexibility Comparison Encryption Machine Learning Solid State Drive Password Unsupported Software Content Management Automation Information Technology Data Storage Private Cloud Wi-Fi Value Operating System Server Access Control Business Owner Paperless Office Smart Tech Education Bring Your Own Device Update Holiday Servers Credit Cards Information Networking Workers Budget Mobile Device Microsoft Office Data loss Infrastructure Work/Life Balance VPN Big Data Training OneNote Website Firewall Miscellaneous Upgrade Employer-Employee Relationship File Sharing IT Plan CES Data Breach Enterprise Content Management Conferencing Black Market Cast Content Filtering Software as a Service Business Mangement Wireless Remote Work Instant Messaging Windows 10 Tools Unified Communications Devices Samsung Hacking Outlook Remote Monitoring and Maintenance Network Congestion Online Shopping Inventory Charger Worker Commute Multi-Factor Security Telephone System Smart Office Downtime Hard Drives HIPAA Telephony IoT Password Management Battery Government Gmail Addiction Computer Fan Legal Entertainment Regulations Root Cause Analysis USB Theft Thought Leadership Computing Infrastructure Frequently Asked Questions Specifications Line of Business Strategy YouTube Electronic Medical Records IT Consultant Skype Augmented Reality Evernote Software Tips Trending Remote Computing NIST Recycling Cache FENG Public Cloud Wireless Technology Cortana Recovery Meetings Botnet Google Apps Streaming Media Windows 10s Data Management Excel Millennials MSP Leadership Keyboard The Internet of Things Start Menu Wireless Charging Authentication Unified Threat Management Netflix Marketing Physical Security Hacker Lifestyle Human Resources Students Insurance Cryptocurrency Data Warehousing eWaste Wireless Internet Managed Service Provider Flash Fraud Travel Content Filter SaaS End of Support Tip of the week Workforce Mobile Fiber-Optic Nanotechnology Cleaning Settings Save Time Mobile Computing Managed Service Staff Healthcare Current Events Practices Safe Mode Health Office Tips Users Patch Management Google Docs Business Technology Criminal Wire PDF Risk Management Amazon HVAC webinar Technology Tips Screen Mirroring Password Manager Storage Audit Windows Server 2008 Telecommuting Accountants Workplace Tips Professional Services Cables Computer Care HaaS HBO Proactive Digital Signature Electronic Health Records Knowledge Hosted Computing Emails Virtual Reality Scam Voice over Internet Protocol Virtual Assistant Sports Google Drive Sync Amazon Web Services Bluetooth Office Twitter Assessment Advertising Audiobook Wearable Technology Colocation Webinar History Transportation Video Games Public Speaking Relocation Books Television Search Presentation How to Automobile Lithium-ion battery IT solutions Techology Benefits Regulation Worker Humor Tech Support Public Computer Best Practice 5G Troubleshooting IBM Loyalty Internet Exlporer Safety Company Culture Scalability User Error Smart Technology Rootkit Emergency WiFi Hybrid Cloud Shadow IT Hosted Solution Customer Relationship Management Competition Remote Worker Managing Stress Employer Employee Relationship Experience IP Address Hiring/Firing Computer Accessories Quick Tips Customer Service Fun Internet exploMicrosoft Content Wiring Music Mobile Office Two Factor Authentication Vendor Management Files CrashOverride Politics Domains

      Mobile? Grab this Article!

      QR-Code dieser Seite