(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give TaylorWorks a call at 407-478-6600.

Does Outsourcing Your Business’ Network Security M...
Monitoring and Automation Make for a More Secure S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 27 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Technology Network Security Managed IT Services Privacy Best Practices Business Computing Hackers Data Backup Email VoIP Hosted Solutions Malware Google Microsoft Software Backup Outsourced IT Data Recovery Business Continuity Cloud Computing Saving Money Mobile Devices Small Business Internet Android IT Support Data Efficiency Internet of Things Cybercrime Disaster Recovery Cybersecurity Ransomware Tech Term Innovation User Tips How To Business Law Enforcement Communications Communication IT Services Smartphones BDR Hardware Managed IT Business Management Phishing Browser Data Security Smartphone Chrome Data Protection Virtualization Router Managed IT Services Avoiding Downtime Business Intelligence Collaboration Productivity BYOD Mobile Device Management Two-factor Authentication Computers Apps Windows 10 Gadgets Redundancy Mobility Network Windows Bandwidth App Vulnerability Compliance Remote Monitoring Money Alert Spam Artificial Intelligence Identity Theft Social Engineering Proactive IT Telephone Systems Credit Cards Budget Flexibility Information Technology Infrastructure Data loss Big Data OneNote Employer-Employee Relationship Applications Data Breach Social Media Work/Life Balance Spam Blocking Smart Tech Comparison IT Support Server Wi-Fi Operating System Value Data Storage Computer Passwords Update Workers Solid State Drive Business Owner VPN Private Cloud Holiday Office 365 Website IT Management Firewall Document Management Mobile Device CES IT Plan Unsupported Software Save Money Word Bring Your Own Device Leadership Servers Hacking HaaS Google Drive Google Apps Netflix Botnet Unified Threat Management HIPAA Keyboard Physical Security Connectivity Productivity Battery The Internet of Things Facebook Human Resources Lifestyle Fraud Flash Remote Computing Settings Travel Cleaning Patch Management Devices Education Staff Mobile Computing Computing Infrastructure Amazon webinar Data Management Users Password Manager Computer Care Screen Mirroring IoT HBO Scam Thought Leadership Upgrade Digital Signature Amazon Web Services Conferencing Sync Wireless Business Mangement Software as a Service Samsung Cast Outlook Streaming Media Windows 10 Encryption Downtime Automation End of Support Online Shopping Telephony Gmail Government Insurance Frequently Asked Questions Content Filter Virtual Reality Office Tips Strategy Root Cause Analysis Health Specifications Evernote Skype Cortana Practices Wireless Technology Recycling Windows 10s Excel Storage Worker Commute Analysis Meetings Millennials Networking Marketing Wireless Charging Start Menu Hacker Legal Hosted Computing Microsoft Office eWaste SaaS Data Warehousing Tip of the week Password Workforce Current Events Fiber-Optic Mobile Training Technology Tips Inventory Recovery Criminal Audit Google Docs Windows Server 2008 Addiction Accountants Telecommuting Knowledge Public Cloud Cables Emails Professional Services Access Control Voice over Internet Protocol Content Filtering Network Congestion Windows 7 Cache Hard Drives Save Time Remote Work Unified Communications Tools Charger Risk Management Authentication Content Management Computer Fan Multi-Factor Security IT Consultant Regulations Electronic Medical Records Wireless Internet PDF Theft Software Tips Nanotechnology Black Market Blockchain FENG Trending Wire Tech Support Video Games Safety Emergency Colocation Employer Employee Relationship Sports Hiring/Firing Automobile Competition Experience Fun Computer Accessories Miscellaneous Scalability Music CrashOverride Internet Exlporer Bluetooth Wearable Technology Transportation Search Content Workplace Tips Presentation USB Benefits Internet exploMicrosoft Worker Audiobook 5G Instant Messaging Loyalty Troubleshooting Smart Technology Managed Service Provider IBM Files Advertising Rootkit Entertainment How to WiFi Hosted Solution Twitter Customer Relationship Management History IP Address Best Practice Two Factor Authentication Customer Service Techology Vendor Management Office Mobile Office Shadow IT Domains Assessment User Error Hybrid Cloud Webinar Relocation Books Public Speaking Television IT solutions Humor Politics Lithium-ion battery Augmented Reality Quick Tips Public Computer

      Mobile? Grab this Article!

      QR-Code dieser Seite