XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give XFER a call at 734-927-6666 / 800-Get-XFER.

Does Outsourcing Your Business’ Network Security M...
Monitoring and Automation Make for a More Secure S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, August 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Productivity Hackers Data Hosted Solutions Google Mobile Office Hardware Mobile Devices VoIP Gadgets Email Quick Tips Malware Efficiency Network IT Support Social Media Business Management Innovation Smartphones Miscellaneous Network Security IT Services Business Continuity Server Virtualization Upgrade Business Windows Disaster Recovery Communication Managed IT Services Microsoft Office Computer Communications Users Mobile Device Management Passwords User Tips Data Backup Android Marketing Smartphone Browser Alert WiFi Holiday Save Money Vendor Management Data Recovery Cybercrime Outsourced IT Operating System Windows 10 Remote Monitoring Tech Term Mobile Computing Ransomware Cloud Computing BYOD Information Technology Avoiding Downtime Internet of Things Bring Your Own Device Computers Apple BDR Router Telephone Systems Automation Going Green Current Events Big Data VPN Remote Computing History Best Practice IT Solutions The Internet of Things Chrome IT Consultant Facebook Hacking Firewall Social Engineering Spam Employer-Employee Relationship Health Trending Phone System Application Artificial Intelligence Wireless Technology Cybersecurity Collaboration Bandwidth Money Proactive IT Office Budget Excel Managed IT Services Lithium-ion Battery App Printer How To Business Managament Networking Business Intelligence Fax Server Maintenance Windows 8 Two-factor Authentication Mobility iPhone Recovery Content Filtering Value Humor Outlook Apps Private Cloud Website Tutorials Redundancy Virus Law Enforcement PowerPoint Unified Threat Management Office 365 Phishing Gmail Applications Antivirus Data Protection Analytics Customer Relationship Management Hard Drives Mouse Data Security Managed IT User Error Search Save Time Tablet Administration Sports Mobile Device IT Management Twitter Document Management Social Networking Productivity Office Tips Digital Payment Computer Repair Data Management Streaming Media Risk Management Compliance Windows 10 Flexibility Analysis Entertainment Saving Time IT Support Retail Vulnerability Blockchain Connectivity Word Tech Support Downtime Google Drive File Sharing Memory Network Congestion Inbound Marketing Identity Theft Conferencing USB Credit Cards HaaS End of Support Robot Safety Wi-Fi Government Online Currency Access Control YouTube Data loss Meetings Recycling Smart Tech Servers Point of Sale Education Spam Blocking Video Surveillance CES IT Plan DDoS Statistics Machine Learning Information Webinar Solid State Drive Programming IBM Encryption Skype Piracy Content Management Black Market Leadership Unsupported Software Instant Messaging Administrator Infrastructure Wireless Physical Security Augmented Reality Intranet Environment Cleaning Password Running Cable Paperless Office OneNote Settings Wearable Technology Human Resources Public Cloud Computer Accessories Update Data Storage SaaS Biometrics IT service Training Comparison Data storage Work/Life Balance Data Breach Hacker Social Windows 7 Scam Best Available Bluetooth eWaste Workers Internet Exlporer People PDF Samsung Touchscreen NIST HBO Thought Leadership Travel Criminal Millennials Line of Business Entrepreneur Mobile Cortana Electronic Health Records Multi-Factor Security Strategy Reputation Knowledge Tablets Wireless Charging Wire FENG IT Security Cryptocurrency Hiring/Firing Frequently Asked Questions Fraud Internet exploMicrosoft Content Filter Patch Management Windows Media Player Virtual Desktop Screen Mirroring Workforce Authentication MSP 360 Emails Cost Management Professional Services Google Apps NarrowBand Print Server Lifestyle Customers Remote Support Insurance Upgrades Analyitcs Webcam Flash Fiber-Optic Uninterrupted Power Supply nternet Crowdfunding Smart Office Electronic Medical Records Safe Mode Business Owner Tip of the week Amazon Advertising Storage Windows 10s Customer Service Software as a Service Charger Cast Consultant Telecommuting Help Desk Distributed Denial of Service Files Company Culture Nanotechnology Tools Chromecast Law Firm IT HVAC PC Care Practices Managed Service HIPAA Sync Cables Hiring/Firing Accountants Business Technology Scheduling Windows Server 2008 Amazon Web Services Notifications LinkedIn Addiction Cameras 3D Enterprise Content Management Computer Care Licensing Software Tips Remote Work Colocation Net Neutrality Hosted Solution eBay Password Manager Laptop Alerts SharePoint Windows 8.1 Update Hosted Computing Proactive Keyboard Virtual Reality Telephony Unified Communications Shadow IT Students WIndows 7 Display Virtual Assistant Online Shopping Hybrid Cloud Cache Audit Printer Server Shortcut Google Docs Staff Password Management User IaaS Computing Infrastructure Devices Netflix Worker Commute Text Messaging Botnet Business Mangement Macro Touchpad Debate Managing Stress Domains Work Station Data Warehousing Specifications Relocation Inventory Remote Monitoring and Maintenance Bloatware Gaming Console Start Menu Theft Co-managed IT Legal Healthcare Root Cause Analysis Voice over Internet Protocol Digital Signature Monitor IoT Telephone System Supercomputer Science Regulations Evernote Wireless Internet Computer Fan Emergency Music Worker Regulation Audiobook Assessment Battery Rootkit Video Games Politics Television Transportation Remote Worker Troubleshooting Webinar Scalability Thank You Automobile Public Computer Benefits Wiring IT solutions How to Congratulations Techology Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience Content Two Factor Authentication

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *