window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give TaylorWorks a call at 407-478-6600.

Does Outsourcing Your Business’ Network Security M...
Monitoring and Automation Make for a More Secure S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, October 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Privacy Managed IT Services Business Computing Hackers Data Backup Email Malware VoIP Data Outsourced IT Hosted Solutions Data Recovery Mobile Devices Tech Term Microsoft Google Innovation Backup Internet Software Cloud Computing Business Continuity Saving Money Internet of Things Ransomware Hardware IT Services Communication Small Business Android IT Support BDR Cybersecurity User Tips Efficiency Smartphones Communications Cybercrime Browser Disaster Recovery Artificial Intelligence Applications Computer Law Enforcement Managed IT Workplace Tips How To Gadgets Network Productivity Router Business Managed IT Services Windows 10 Avoiding Downtime Phishing Chrome Virtualization Save Money Business Intelligence Computers Smartphone Money IT Support Data Security BYOD Data Protection Business Management Mobile Device Management Collaboration Windows Two-factor Authentication Compliance Vulnerability Passwords App Identity Theft Remote Monitoring Word Facebook Training Firewall Apps Productivity Blockchain Server Analysis Office 365 Alert Miscellaneous Upgrade IT Management Telephone Systems Redundancy Bandwidth Social Media Proactive IT Mobility Spam Document Management Connectivity Social Engineering Information Employer-Employee Relationship Unsupported Software Encryption Machine Learning Managed Service Data Storage Content Management Settings OneNote Solid State Drive Flexibility Information Technology Access Control Scam Update Password Paperless Office Servers Credit Cards Virtual Assistant Data Breach Budget Private Cloud Microsoft Office Smart Tech Big Data Spam Blocking Fraud Telephone System Automation Data loss Website Infrastructure Mobile Computing VPN Business Owner Value Operating System Holiday Education Bring Your Own Device IT Plan Keyboard File Sharing Networking Mobile Device CES Sports Unified Threat Management Windows 7 Work/Life Balance Workers Comparison Wi-Fi Online Shopping Unified Communications Save Time Devices Remote Worker Multi-Factor Security HaaS SaaS Telephony Google Drive Augmented Reality Inventory Patch Management Current Events Government Risk Management Smart Office Cleaning Regulations Business Technology Root Cause Analysis Gmail Addiction Virtual Private Network Frequently Asked Questions Specifications Wireless Technology IoT Password Management Skype Evernote Theft Thought Leadership Wiring webinar Software Tips Trending Strategy YouTube Audit Hard Drives The Internet of Things Virtual Reality Proactive Knowledge Marketing Hacker Computer Care Meetings Botnet Recycling Cache Project Management Emails Excel Millennials Black Market Content Filtering NIST Start Menu Wireless Charging Google Apps Hacking Streaming Media GDPR Conferencing Physical Security Lifestyle Computing Infrastructure Instant Messaging Worker Commute Authentication Remote Monitoring and Maintenance Network Congestion Data Warehousing Human Resources HIPAA Students Samsung Flash Downtime Travel Users Legal eWaste Entertainment Wireless Internet Charger Warranty Tip of the week Workforce Public Cloud Battery Insurance Cryptocurrency Computer Fan Mobile Cortana Content Filter E-Commerce USB Fiber-Optic Nanotechnology Electronic Medical Records Line of Business IT Consultant Google Docs Remote Computing Staff Healthcare Amazon Safe Mode Screen Mirroring Criminal Wire Printer Windows Server 2008 Telecommuting Managed Service Provider Practices FENG Professional Services Password Manager Data Management Storage Camera HBO End of Support Recovery Wireless Accountants HVAC Windows 10 Cables MSP Leadership Voice over Internet Protocol Digital Signature Electronic Health Records Windows 10s Sync Amazon Web Services Hosted Computing Cast Software as a Service Health Office Tips Mouse Netflix Remote Work PDF Tools Technology Tips Business Mangement Outlook Enterprise Content Management Employer Employee Relationship Lithium-ion battery Experience Files Office Tech Support Content Advertising 5G IBM Computer Accessories Colocation Safety Music Two Factor Authentication History Politics CrashOverride Relocation Audiobook Vendor Management Search Customer Relationship Management Bluetooth Competition Wearable Technology Company Culture Assessment Transportation WiFi Techology Video Games IP Address Humor Webinar Books Television Customer Service Automobile Internet Exlporer How to Managing Stress Benefits User Error Mobile Office Regulation Best Practice IT solutions Hybrid Cloud Domains Public Computer Worker Troubleshooting Hiring/Firing Smart Technology Scalability Loyalty Emergency Public Speaking Quick Tips Twitter Rootkit Printers Fun Internet exploMicrosoft Presentation Shadow IT Hosted Solution

Mobile? Grab this Article!

QR-Code dieser Seite