Contact us today!

FRS Pros Blog

Know Your Technology: Computer Forensics

Know Your Technology: Computer Forensics

Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.

What Are Computer Forensics, and What Are They Used For?
Computer forensics is generally considered the application of special processes and techniques that can be used to analyze information on a computer or network. Forensics are also generally meant to protect evidence that could potentially be used in a trial. Once the warrant required has been issued, a forensic technician will go on-site to isolate the device from the Internet or other attached networks that could influence its contents. They then copy over every file on the device and dig through them for anything of note. It’s important that the investigator makes a copy of each file so that the original evidence can be preserved. Even something as simple as accessing a file can lead to slight alterations, making the evidence of little consequence in a court of law, civil or criminal case.

Computer forensics can be used for any number of different cases. Depending on the nature of the crime, any device could be used to obtain evidence of what is, was, or will be happening. These types of investigation take an extremely close look at the data, including not just the files that are currently there, but at the metadata for just about any items on the device. This includes looking at when the file was first created, when it was edited and saved, and who might have been the one to carry out these actions.

This process can be used to solve any number of cases. Here are just a couple to look at as an example:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Law enforcement agencies are certainly not the only ones that place an emphasis on computer forensics. There are many others that also have accredited laboratories. You might be surprised to hear about a couple of these, as they include Walmart, American Express, and Target (which is kind of hilarious in the wake of the Target data breach not too long ago). There are also numerous independent labs that, while lacking accreditation, can potentially outperform law enforcement agencies under the right conditions.

Independent labs are often onboarded by law enforcement to help with crime solving. The perfect example of this is Target, whose labs have helped with “felony, homicide, and special-circumstances cases” in the past. These claims come from a spokesperson who, in 2008, claimed that about a quarter of cases managed by Target’s forensic laboratory were external and had nothing to do with the company itself.

How Does Your Technology Compare?
If your organization would like a team on your side to ensure that security is always a top priority, reach out to FRS Pros at 561-795-2000. We aren’t a dedicated computer forensics agency, but we know all about network security and compliance issues.

Some of the Value that Cloud Computing Offers
A Brief Overview of Network Security


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, October 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Google Business Management Tech Term Business Computing Cloud Software User Tips Hackers Hardware Malware Browser Computer Windows Microsoft Cybersecurity Efficiency Mobile Devices Data Backup Hosted Solutions Smartphone Innovation Cybercrime Apps Productivity Windows 10 Data Recovery Operating System IT Services Data Security Internet of Things Smartphones Android Outsourced IT Ransomware Backup Business Continuity Mobile Device Management Upgrade Vulnerability Office 365 Data VoIP Business Money Email Alert Phishing IT Support Law Enforcement IT Support Communications Saving Money Chrome Microsoft Office Server Collaboration Network Managed IT Services Best Practice Disaster Recovery Managed Service Provider Blockchain Managed IT Two-factor Authentication Small Business Unsupported Software Employer-Employee Relationship Router Windows 10 App Applications Cloud Computing Spam Computers Google Drive Virtualization Information Telephone Systems Gadgets Information Technology Tech Support Passwords Update Password The Internet of Things Social Media Automation Travel Politics Shortcut VPN iPhone Excel Fraud Cost Management Managed IT Services Workplace Tips Augmented Reality BDR Hacking Facebook Gmail Commerce WannaCry User Error Users Quick Tips Save Money Hosted Solution Avoiding Downtime Cortana Application Networking SaaS Budget Proactive IT Managed Service Safety Wireless Technology Mobile Security Data Management Communication Touchscreen Data Storage Bring Your Own Device Artificial Intelligence Google Docs Project Management WiFi Patch Management Wireless Charging Holiday Devices Mobile Device OneNote Google Assistant Government Productivity Risk Management Sports Robot Data Breach Audit Data Protection Wi-Fi Miscellaneous Root Cause Analysis Data Privacy Windows 7 Specifications Virus Emails Cast Amazon Internet Exlporer Microsoft Word Business Technology File Sharing Upgrades Gamification Computer Fan Apple Reputation Hard Disk Drive IT Management Software as a Service Vendor Management Uninterrupted Power Supply Hard Drive Display History Sales Proactive Marketing BYOD Virtual Assistant Scam Data storage Tablets Maintenance Testing Storage Social Engineering Memory Remote Computing Health Sync Evernote Edge Computer Forensics FAQ IT Solutions Bandwidth Samsung Chromebook Co-Managed Services Files Wireless Retail Websites Webinar Alexa for Business DDoS Settings NFL eWaste Camera Legal Disaster Mobility Identities Consultant Financial Recovery Search Data Loss Ciminal Remote Monitoring Management Encryption Transportation Charger Antivirus Laptop Device Security Printing Telephone Private Cloud Conferencing Data Theft IT solutions Word Projects Legislation Language Administrator Adobe Workers Lithium-ion battery Touchpad PowerPoint Going Green Social Streaming Media iOS WIndows Server 2008 Vendor Windows Ink Hyperlink Emergency Gifts Computing Windows 10s HBO Nanotechnology Identity Comparison Screen Mirroring Hybrid Cloud Point of Sale Access Licensing Updates Computer Care Humor Microsoft Excel IT budget Unified Threat Management Wireless Internet Chromecast Outlook Employee-Employer Relationship Google Maps Spyware Meetings Value Credit Cards App store Solid State Drive Identity Theft Telephony Big Data Personal Information Automobile Office Managing Stress es Twitter Accessory USB Worker PDF How To Books Mobile Computing Video Games Experience Education Hiring/Firing Cache Peripheral Virtual Reality Work/Life Balance Text Messaging Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System Benefits Training Monitors Office tips Save Time Television CrashOverride Computer Accessories Advertising Flexibility Music Battery Smart Technology Company Culture Instant Messaging Hacker Compliance Thank You Printers Scalability Analytics HaaS End of Support Entertainment Keyboard Relocation Wasting Time Black Market Cleaning Regulation Congratulations