Mavericks Blogs

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give Mavericks a call at (440) 305-5514.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Tech Term Privacy User Tips Data Data recovery Data Backup Hosted Solutions Mobile Devices Network Security Business Computing Innovation Email Cloud Smartphone Workplace Tips Internet Internet of Things Cloud Computing Malware Google IT Services Artificial Intelligence Communications Hardware Smartphones Network Browser BDR Hackers Backup Information Productivity Windows 10 Router VoIp Business Outsourced IT Communication IT Support Saving Money Applications Business Management Holiday Chrome Microsoft Computer Windows Mobile Device Managed Service Small Business Managed IT Services Connectivity Miscellaneous Data Protection Android Encryption Content Management Save Money Passwords Identity Theft Facebook Business Intelligence VPN Office 365 Human Resources Software as a Service Money Server Blockchain Infrastructure Telephone System Gadgets Vulnerability Fraud Keyboard Paperless Office Social Engineering Automation How To Sports Password Settings Disaster Recovery Computers Cybercrime Access Control Voice over Internet Protocol Comparison Two-factor Authentication Business Continuity Managed IT services Servers CES Virtual Assistant Machine Learning Efficiency Word Devices Amazon Web Services HVAC Spam Workforce Windows 7 Ransomware Alert Website Wireless Charging Wiring Wi-Fi Criminal organizations need WiFi NIST File Sharing Mobility Recycling Hosted Computing Telecommuting Warranty Cortana Collaboration Apps Cybersecurity USB Software Cache Firewall Hacker Bandwidth Credit Cards YouTube Microchip Cryptocurrency Social Media Social eWaste Disaster Recovery Systems Organizations today Inventory Remote Work Document Management Printer Google Apps IT Plan Thought Leadership Online Shopping Google Drive Big Data Data Security Wire Camera HIPAA Search Engine Digital Signature Unified Threat Management Botnet Accountants Bring Your Own Device Nanotechnology Staff Addiction Safe Mode Augmented Reality Vendor data-driven marketplace Mouse OneNote Networking Google Docs Business Mangement BYOD Cleaning Electronic Medical Records Microsoft Office Bing PDF Work/Life Balance Wireless Internet Smartwatch Smart Tech Employer-Employee Relationship Virtualization Training Display top-line performance Entertainment Managed IT Evernote Enterprise Content Management Shortcuts Mobile Device Management Practices Smart Office Remote Monitoring Amazon Help Desk Password Manager Update Millennials Upgrade Mobile Computing Phishing Workers Charger Remote Worker Security Cameras Legal business intelligence Authentication Telephone Systems Administrator Specifications Law Enforcement Password Management MSP Telephony Gmail IT Management Scam Data Management Compliance Thank You Quick Tips Regulation Congratulations Twitter Company Culture Printers Managing Stress