XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give XFER a call at 734-927-6666 / 800-Get-XFER.

Does Outsourcing Your Business’ Network Security M...
Monitoring and Automation Make for a More Secure S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Data Small Business Hardware Hosted Solutions Google Mobile Devices Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Network Security Network IT Support Efficiency Social Media Innovation Business Management IT Services Server Miscellaneous Business Continuity Smartphones Upgrade Virtualization Business Windows Communication Disaster Recovery Computer Communications Managed IT Services Microsoft Office Data Backup User Tips Users Passwords Mobile Device Management Browser Android Marketing Save Money Smartphone Ransomware Holiday WiFi Data Recovery Alert Vendor Management Outsourced IT Mobile Computing Tech Term Internet of Things Remote Monitoring Cybercrime Windows 10 Operating System Computers Bring Your Own Device BDR Apple BYOD Cloud Computing Information Technology Avoiding Downtime Big Data Firewall Remote Computing Chrome IT Solutions The Internet of Things Current Events Automation Router Artificial Intelligence Telephone Systems Going Green Best Practice History VPN Printer Facebook Application Phone System Collaboration Wireless Technology Hacking Trending IT Consultant Health Social Engineering Cybersecurity Employer-Employee Relationship Spam Lithium-ion Battery Managed IT Services Bandwidth Money Excel Office Proactive IT App Budget Business Intelligence iPhone Recovery Mouse Business Managament Content Filtering Fax Server Maintenance Networking Windows 8 How To Unified Threat Management Applications Two-factor Authentication Mobility Windows 10 User Error Antivirus Customer Relationship Management Training Data Protection Hard Drives Humor Analytics Outlook Tutorials Managed IT Virus Website Data Security Private Cloud Apps Gmail Sports Redundancy Value Law Enforcement PowerPoint Productivity Office 365 Phishing Network Congestion Saving Time Google Drive IT Support Blockchain Vulnerability Inbound Marketing Word Downtime Information File Sharing Memory Analysis Save Time Office Tips Identity Theft Administration Conferencing Mobile Device Digital Payment Social Networking Connectivity Compliance Data Management Flexibility Computer Repair Search Tablet Entertainment Tech Support IT Management Twitter Document Management Scam Encryption Settings Retail Streaming Media Risk Management Content Management Public Cloud IT service Programming Access Control Computer Accessories Skype Infrastructure SaaS Unsupported Software Smart Tech Hacker Running Cable Augmented Reality Intranet OneNote Update Machine Learning Social Wearable Technology Data storage Data Storage eWaste Robot Keyboard Comparison Internet Exlporer USB Touchscreen Best Available Webinar Work/Life Balance Data Breach PDF Windows 7 Paperless Office HaaS End of Support Bluetooth Managed Service Safety Wi-Fi Government People Workers YouTube Samsung Meetings Credit Cards Video Surveillance DDoS Virtual Assistant Online Currency Data loss Point of Sale Solid State Drive Recycling Servers Instant Messaging CES IBM Education Spam Blocking Fraud Black Market Environment Piracy Leadership Statistics IT Plan Telephone System Human Resources Administrator Biometrics Cleaning Password Wireless Physical Security Business Owner Software as a Service Electronic Health Records Notifications WIndows 7 Scheduling Windows 10s Tip of the week Amazon Line of Business Virtual Reality 3D Tools Wire Colocation Printer Server Shortcut Law Firm IT Telecommuting Laptop eBay Company Culture Charger Cast Camera Worker Commute Alerts HIPAA Cryptocurrency Shadow IT User Hiring/Firing Sync Cables Content Filter SharePoint LinkedIn Hybrid Cloud Managing Stress Domains Windows Server 2008 Amazon Web Services Authentication MSP Bloatware Password Manager Smart Office IaaS Computing Infrastructure Hosted Solution Software Tips Remote Work Insurance Touchpad Science Text Messaging Net Neutrality Computer Care Storage Relocation Work Station Safe Mode Legal Gaming Console Windows 8.1 Update Telephony Unified Communications Google Docs Staff HVAC Display Audit Online Shopping Nanotechnology Remote Worker Monitor Entrepreneur Botnet Business Mangement Debate Netflix Practices Tablets Addiction Virtual Private Network Windows Media Player Virtual Desktop Data Warehousing Specifications Accountants Business Technology Hiring/Firing Help Desk Root Cause Analysis Start Menu Theft Supercomputer Voice over Internet Protocol Digital Signature Enterprise Content Management Computer Fan Regulations Evernote Wiring Reputation Cost Management Travel Criminal Students Internet exploMicrosoft HBO Hosted Computing Proactive Upgrades Analyitcs Mobile Cortana Cache Project Management Customer Service Millennials NarrowBand Knowledge Multi-Factor Security Strategy Password Management Uninterrupted Power Supply Consultant Webcam FENG Wireless Charging Devices GDPR Customers Healthcare Advertising IT Security Patch Management Frequently Asked Questions Inventory Remote Monitoring and Maintenance Professional Services Google Apps Wireless Internet Distributed Denial of Service Warranty Files Cameras Print Server Macro 360 Emails Workforce IoT Chromecast Screen Mirroring PC Care nternet Crowdfunding Co-managed IT Lifestyle NIST Licensing Remote Support Electronic Medical Records Flash Fiber-Optic Thought Leadership E-Commerce Television Transportation Troubleshooting Webinar Regulation How to Techology Automobile Public Computer Benefits IT solutions Printers Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience Content Thank You Two Factor Authentication Emergency Battery Music Video Games Worker Audiobook Congratulations Assessment Scalability Rootkit Politics

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: