(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give NTConnections a call at (703) 288-9767.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Backup Internet Malware Google Mobile Devices Efficiency VoIP IT Support Business Email Network Security IT Services Managed Service Provider Miscellaneous Workplace Tips Innovation Server Data Upgrade Disaster Recovery Business Continuity Network Business Management Software Windows Saving Money Hardware Communication Computer Managed IT Services Save Money Android Mobile Device Management Virtualization Browser Smartphone User Tips Data Backup Smartphones communications Holiday Cybercrime Microsoft Office Outsourced IT Internet of Things BYOD Windows 10 WiFi Computers Hacking Chrome Big Data Ransomware Small Business Data Recovery Social Media Remote Monitoring Operating System Mobile Computing Cloud Computing IT Solutions VPN Managed IT Services Alert Application Apple Automation Proactive IT Avoiding Downtime Collaboration The Internet of Things Quick Tips Tech Term Social Engineering Information Technology BDR Employer-Employee Relationship Passwords Office Marketing Budget Mobility Health Bring Your Own Device Recovery spam Cybersecurity Gadgets Telephone Systems Bandwidth Artificial Intelligence Managed IT Going Green Remote Computing Office 365 User Error IT Support Two-factor Authentication Document Management Data Protection Vendor Management Business Intelligence Website iPhone Money Save Time Firewall App Gmail Router Private Cloud Vulnerability Compliance How To Data Security Redundancy Wireless Technology Law Enforcement Data Management Productivity Risk Management Word PowerPoint Windows 10 Connectivity Excel Phone System Antivirus Content Filtering Office Tips Downtime Facebook History Tablet Entertainment Lithium-ion battery Analytics Value Retail Memory Search Phishing Identity Theft Networking Mouse Apps Black Market Solid State Drive Applications Humor Infrastructure Saving Time Statistics Data Storage Streaming Media Analysis Internet Exlporer Online Currency Workers Data storage Comparison Encryption Biometrics Outlook Windows 7 Sports Business Owner eWaste Printer OneNote USB YouTube Flexibility Hard Drives IT Management Mobile Device Current Events Administration Servers Work/Life Balance Maintenance IT Plan Smart Tech Running Cable Physical Security DDoS CES Data loss Skype Unsupported Software Unified Threat Management Robot Google Drive Public Cloud Mobile Office Environment Content Management Update Customer Relationship Management Intranet Human Resources SaaS Best Available Training People Safety HIPAA Government Programming Network Congestion Credit Cards Cleaning Meetings Trending HaaS Education IT Consultant Fax Server Hacker Google Apps Professional Services Cast Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Amazon Wire Tip of the week Shadow IT Authentication User Wireless Files Science Tools Password Instant Messaging Company Culture Licensing FENG Nanotechnology Amazon Web Services Smart Office Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut SharePoint Colocation Twitter Windows 8 Password Manager Electronic Medical Records Accountants Bluetooth Online Shopping Paperless Office Crowdfunding Computing Infrastructure Tablets Business Mangement Botnet Monitor Hosted Solution Specifications Data Warehousing Notifications Legal Devices Evernote Students Regulations Reputation Wearable Technology End of Support Recycling Travel Print Server Millennials Windows Media Player Social IoT Wireless Charging Healthcare NarrowBand Customers Internet exploMicrosoft Criminal Hiring/Firing Root Cause Analysis Workforce Thought Leadership Computer Repair Best Practice Social Networking Net Neutrality WIndows 7 Fiber-Optic Electronic Health Records Flash Chromecast Patch Management Advertising Analyitcs Software as a Service Telecommuting Content Filter Insurance Managing Stress Settings Cables Machine Learning Sync Laptop Scam Distributed Denial of Service Touchscreen Remote Work Storage LinkedIn Charger Software Tips Virus Virtual Desktop Practices IT service Unified Communications HVAC Telephony Touchpad Relocation Hybrid Cloud Virtual Reality Blockchain Debate Google Docs Addiction Computer Care Uninterrupted Power Supply Computer Accessories Hosted Computing Domains Theft Start Menu Audit IaaS PDF Bloatware Staff Spam Blocking Voice over Internet Protocol Cache Video Surveillance HBO Cameras Customer Service Inventory Consultant Cortana Mobile Keyboard Screen Mirroring Entrepreneur Digital Signature Multi-Factor Security Fraud Wireless Internet Frequently Asked Questions Tech Support Printer Server Access Control Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Books Emails CrashOverride IBM Emergency Webinar Worker Users Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Smart Technology Windows 10s Battery