Contact us today!

Professional Computer Associates Blog

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give Professional Computer Associates a call at 845-876-6561.

Does Outsourcing Your Business’ Network Security M...
Monitoring and Automation Make for a More Secure S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, August 19 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Backup Malware Hosted Solutions Managed IT Services VoIP Google Disaster Recovery Mobile Devices Microsoft Email Software Productivity Data Business Internet Innovation Outsourced IT Business Continuity Data Backup communications Smartphones Efficiency Cybercrime Hardware Data Recovery IT Services Ransomware Windows 10 Computer IT Support Cloud Computing Browser Tech Term Android BDR Office Internet of Things Windows Alert Telephone Systems Saving Money Computers Server Business Management User Tips Network Upgrade Small Business Virtualization Smartphone Miscellaneous Cybersecurity Mobile Device Management Quick Tips Microsoft Office Law Enforcement Collaboration BYOD Artificial Intelligence Save Money Social Media Applications Managed IT Facebook Social Engineering Chrome Passwords Workplace Tips Managed Service Provider Recovery App How To Money Firewall Hacking Mobility Work/Life Balance Private Cloud Holiday Router Automation Office 365 Bandwidth Avoiding Downtime Gadgets Password Communication Productivity Office Tips Phishing Wi-Fi Business Intelligence Flexibility Remote Monitoring Operating System Information Technology Data Security Gmail Proactive IT VPN Two-factor Authentication Budget Bring Your Own Device Data Management HaaS Data Protection Managed IT Services Health Redundancy Blockchain Identity Theft Cleaning Spam Connectivity Apps SaaS Windows 10 Black Market Compliance IT Management Risk Management IT Support Word Marketing User Error Google Drive Mobile Device Employer-Employee Relationship Value Vulnerability Safety Document Management Entertainment Data Breach Analysis Big Data Electronic Medical Records Wearable Technology Wireless Apple Sports Data storage Solid State Drive Automobile Worker Hiring/Firing Government Information USB PDF eWaste Credit Cards File Sharing HIPAA Computer Care Spam Blocking End of Support Remote Computing Data loss Wireless Technology Windows 7 Computing Infrastructure Instant Messaging Battery Settings Physical Security Legal Best Practice Samsung Update Training Shadow IT Patch Management Machine Learning Business Owner Streaming Media OneNote Education IT Plan DDoS Access Control Keyboard CES Scam Smart Tech Internet Exlporer Infrastructure Downtime YouTube Content Filtering Content Management Paperless Office Unsupported Software Public Cloud Encryption Mobile Computing Website Data Storage Charger Servers History The Internet of Things Comparison Save Time Meetings Workers Networking Voice over Internet Protocol Students Users People Software Tips Relocation Video Games Online Shopping Nanotechnology Music Computer Fan Mobile Hybrid Cloud Notifications Cache Benefits Knowledge Customer Practices Safe Mode Fax Server Unified Threat Management Flash Laptop Business Mangement NarrowBand Specifications Accountants HVAC Windows Server 2008 Colocation Theft MSP Books IBM Multi-Factor Security Human Resources Healthcare Virtual Reality Mobile Office webinar Scalability Mouse Evernote Assessment FENG Professional Services Wireless Internet Smart Technology Network Congestion Data Warehousing Hosted Computing IT solutions Sync Touchpad Software as a Service Recycling Outlook Millennials Enterprise Content Management Rootkit Emails Tech Support Cortana Addiction Augmented Reality Emergency Trending Staff Electronic Health Records Worker Commute Employer Employee Relationship Conferencing HBO Wireless Charging Devices Managed Service Troubleshooting Television Tools Wire Environment Fraud Inventory Business Technology Windows 10s Telephony Internet exploMicrosoft Lithium-ion battery Criminal Screen Mirroring Humor Chromecast Workforce IoT Password Management Content Running Cable Regulations hacker Google Apps IaaS Lifestyle Digital Signature Computer Accessories Antivirus Frequently Asked Questions iPhone Search Fiber-Optic Thought Leadership Proactive Hosted Solution Public Computer Smart Office Two Factor Authentication IT Consultant Amazon Virtual Assistant Skype Advertising Google Docs Supercomputer Cast Monitor Telecommuting NIST Audiobook Vendor Management Strategy Bluetooth Excel How to Uninterrupted Power Supply Cables Content Filter Remote Monitoring and Maintenance SharePoint Botnet Leadership Distributed Denial of Service Amazon Web Services Authentication Telephone System Experience WiFi Loyalty Audit Start Menu Transportation Current Events Reputation Techology Remote Work Insurance Cryptocurrency Politics Netflix Going Green Password Manager Robot Hard Drives Tip of the week Files Unified Communications Storage Line of Business Root Cause Analysis Travel Regulation Thank You Twitter Congratulations Webinar Remote Worker IT solutions Administration Wiring Company Culture CrashOverride Managing Stress

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!