XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
2 minutes reading time (467 words)

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give XFER a call at 734-927-6666 / 800-Get-XFER.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Google Hackers Mobile Office Hosted Solutions Productivity Data Hardware Mobile Devices VoIP Quick Tips Gadgets Email Malware IT Support Efficiency Network Social Media Business Management Business Continuity Business IT Services Smartphones Network Security Server Virtualization Upgrade Innovation Miscellaneous Disaster Recovery Windows Communication Microsoft Office Users Managed IT Services Communications Mobile Device Management Computer Android User Tips Passwords Browser Marketing Smartphone WiFi Holiday Alert Save Money Vendor Management Data Backup Windows 10 Mobile Computing Ransomware Operating System Cybercrime Remote Monitoring Bring Your Own Device Apple BYOD Information Technology Computers Avoiding Downtime Remote Computing History Best Practice IT Solutions The Internet of Things Internet of Things Going Green Chrome Cloud Computing VPN Outsourced IT Telephone Systems Current Events Big Data Data Recovery Employer-Employee Relationship Wireless Technology IT Consultant Router Trending Application Firewall Collaboration Hacking BDR Automation Spam Social Engineering Health Phone System Lithium-ion Battery Office Excel Tech Term Budget App Artificial Intelligence Printer Facebook Cybersecurity Money Bandwidth Proactive IT Maintenance Windows 8 Content Filtering Two-factor Authentication Mobility Managed IT Services Recovery How To Business Managament iPhone Fax Server Business Intelligence Law Enforcement Analytics Office 365 Data Protection Apps User Error PowerPoint Unified Threat Management Value Humor Managed IT Data Security Outlook Tutorials Virus Website Customer Relationship Management Hard Drives Antivirus Networking Private Cloud Redundancy Gmail Phishing Mouse Entertainment Retail Downtime Connectivity Tech Support Vulnerability Memory Administration Mobile Device Social Networking Digital Payment Conferencing Network Congestion Computer Repair Word Google Drive Sports Search Tablet Twitter Identity Theft Document Management Save Time Streaming Media Risk Management Productivity Office Tips Compliance Windows 10 Flexibility Inbound Marketing Saving Time Data Management Running Cable DDoS Intranet IT Plan Solid State Drive Wearable Technology Environment OneNote Black Market Content Management Settings Touchscreen Encryption Human Resources Infrastructure Unsupported Software Cleaning Best Available Biometrics Scam Data Storage Wireless Physical Security Bluetooth Update IT service Public Cloud Hacker People Work/Life Balance Data Breach Video Surveillance SaaS Samsung Comparison Windows 7 Data storage Workers IBM Piracy Online Currency Leadership Point of Sale Internet Exlporer Smart Tech Robot Administrator Recycling eWaste USB Data loss PDF Safety Statistics Wi-Fi Computer Accessories HaaS End of Support Credit Cards Spam Blocking YouTube Webinar Government IT Management Meetings Programming Training Skype Social CES Windows 10s NarrowBand Professional Services Google Apps Practices Customer Service Business Owner Text Messaging Augmented Reality Workforce Paperless Office Uninterrupted Power Supply LinkedIn Flash Fiber-Optic Accountants Instant Messaging Gaming Console Charger Cast Customers Lifestyle Addiction Consultant Work Station Tip of the week Amazon Hiring/Firing Applications Software as a Service HIPAA IT Support Net Neutrality Advertising File Sharing Chromecast Tools Hosted Computing Cameras Distributed Denial of Service Windows 8.1 Update Files Telecommuting Password Sync Cables Computer Care Display Cache Licensing Hosted Solution Windows Server 2008 Amazon Web Services Virtual Reality Debate Blockchain Devices WIndows 7 Macro Keyboard Notifications Audit Laptop Password Manager Inventory Printer Server Shortcut Co-managed IT Colocation Software Tips Remote Work Netflix Shadow IT Telephony Unified Communications IoT Worker Commute SharePoint Wireless Internet User Online Shopping Bloatware Webcam Root Cause Analysis Google Docs Staff Thought Leadership Managing Stress Domains Hybrid Cloud Science Computer Fan Touchpad Botnet Business Mangement Access Control Supercomputer IaaS Computing Infrastructure Legal Start Menu Theft Relocation Data Warehousing Specifications Wire Regulations Evernote Entrepreneur IT Security Monitor Education Voice over Internet Protocol Digital Signature Content Filter PC Care Tablets Scheduling FENG Print Server Travel Criminal Authentication 3D Knowledge HBO Machine Learning Patch Management nternet Crowdfunding Mobile Cortana Insurance Windows Media Player Virtual Desktop eBay Remote Support Millennials Smart Office Hiring/Firing Servers Wireless Charging Analysis Cost Management Screen Mirroring Reputation Multi-Factor Security Strategy Storage 360 Emails Alerts Upgrades Analyitcs Help Desk Electronic Medical Records Law Firm IT Nanotechnology Company Culture Internet exploMicrosoft Frequently Asked Questions Fraud Transportation Video Games Television Thank You Troubleshooting Webinar Congratulations Benefits Scalability Automobile Public Computer Students IT solutions Employer Employee Relationship CrashOverride Smart Technology How to Healthcare Books Techology Loyalty Experience Two Factor Authentication Content Electronic Health Records Emergency Worker Music Audiobook Assessment Rootkit HVAC Battery Politics

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *