Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Technology: Computer Forensics

Know Your Technology: Computer Forensics

Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.

What Are Computer Forensics, and What Are They Used For?
Computer forensics is generally considered the application of special processes and techniques that can be used to analyze information on a computer or network. Forensics are also generally meant to protect evidence that could potentially be used in a trial. Once the warrant required has been issued, a forensic technician will go on-site to isolate the device from the Internet or other attached networks that could influence its contents. They then copy over every file on the device and dig through them for anything of note. It’s important that the investigator makes a copy of each file so that the original evidence can be preserved. Even something as simple as accessing a file can lead to slight alterations, making the evidence of little consequence in a court of law, civil or criminal case.

Computer forensics can be used for any number of different cases. Depending on the nature of the crime, any device could be used to obtain evidence of what is, was, or will be happening. These types of investigation take an extremely close look at the data, including not just the files that are currently there, but at the metadata for just about any items on the device. This includes looking at when the file was first created, when it was edited and saved, and who might have been the one to carry out these actions.

This process can be used to solve any number of cases. Here are just a couple to look at as an example:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Law enforcement agencies are certainly not the only ones that place an emphasis on computer forensics. There are many others that also have accredited laboratories. You might be surprised to hear about a couple of these, as they include Walmart, American Express, and Target (which is kind of hilarious in the wake of the Target data breach not too long ago). There are also numerous independent labs that, while lacking accreditation, can potentially outperform law enforcement agencies under the right conditions.

Independent labs are often onboarded by law enforcement to help with crime solving. The perfect example of this is Target, whose labs have helped with “felony, homicide, and special-circumstances cases” in the past. These claims come from a spokesperson who, in 2008, claimed that about a quarter of cases managed by Target’s forensic laboratory were external and had nothing to do with the company itself.

How Does Your Technology Compare?
If your organization would like a team on your side to ensure that security is always a top priority, reach out to Excedeo at 619.398.4100. We aren’t a dedicated computer forensics agency, but we know all about network security and compliance issues.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 May 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Business Management Productivity Hackers Google Efficiency Hosted Solutions Backup Managed Service Provider Innovation Business Malware windows Workplace Tips User Tips IT Support Mobile Devices IT Services Computer Saving Money Hardware Miscellaneous Upgrade Email Virtualization Windows 10 Gadgets Network Security Apps Communication Server Disaster Recovery Business Continuity Data Smartphones Microsoft Office Information Technology Network Mobile Computing Mobile Device Management VoIP Small Business Smartphone Quick Tips Health Productivity Social Media Going Green Operating System Browser Android Mobile Office Cybersecurity Holiday Passwords Chrome Cybercrime App Office Alert Best Practice Save Money BYOD Marketing Law Enforcement Application Ransomware Collaboration spam Remote Computing Tech Term Tablet Search The Internet of Things Wearable Technology communications Employer-Employee Relationship Apple WiFi iPhone Hacking Risk Management Cost Management Wireless Technology Managed IT Services BDR Phishing Data Backup Maintenance Facebook User Error Unified Threat Management Antivirus History Vendor Management Data Security Avoiding Downtime Mobility Office Tips IT Solutions Password Hard Drives Big Data Data Management Computers Social Saving Time Telephone Systems Money Government Internet of Things Remote Monitoring Data Recovery Customer Relationship Management Office 365 Two-factor Authentication Net Neutrality Update Printer Tech Support Outlook Wireless Shortcut Gmail Router Encryption USB Social Networking Unsupported Software Analytics OneNote Proactive IT Cloud Computing Wi-Fi Firewall Vulnerability Bandwidth Lithium-ion battery Outsourced IT Users Current Events Phone System Google Drive Automation VPN Bring Your Own Device Humor Website Managed IT Television Education Retail Excel IT COnsultant Identity Theft Computer Repair PowerPoint Work/Life Balance IT Support Social Engineering Streaming Media Virus Windows 10 Trending Audit Politics administration Intranet Budget Laptop Recovery Content Filtering Disaster Data Protection Managing Stress Samsung Storage Battery Paperless Office Personal Information Automobile Devices Cleaning Fax Server Hosted Solution Computing Business Intelligence Patch Management Managed IT Services Save Time Meetings Customer Service Travel Computer Care Telephony Biometrics Fraud Google Docs Virtual Reality Private Cloud Networking HIPAA Wireless Charging Internet Exlporer Legal Transportation Uninterrupted Power Supply Mobile Security Commerce Sales Hard Drive DDoS End of Support Instant Messaging Online Currency Emails Data Breach Flexibility Cortana Entertainment Sports Benefits Augmented Reality Data Storage eWaste Computer Accessories Point of Sale Blockchain Value Printer Server Windows 8 WannaCry Twitter HaaS Artificial Intelligence Programming Black Market Regulations Microsoft Word Touchscreen Monitors Word Electronic Medical Records Bluetooth Co-managed IT Language Display junk Google Assistant Conferencing Amazon Cameras Device Security Webinar IT Management Nanotechnology Windows Ink Safety SharePoint Operating Sysytem User Lifestyle filter Computer Forensics Print Server Gifts Training OneDrive Virtual Desktop Presentation IT solutions WIndows Server 2008 Root Cause Analysis Google Maps Teamwork Best Available Proactive Ebay Credit Cards Company Culture Science Spyware Windows 10s Websites Data Loss Reputation FAQ Sync Worker Commute Buisness Administrator Nokia Solid State Drive Data Theft Settings Keyboard Running Cable hacker Gift Giving Youtube Charger Video Games Access 3D Printing Near Field Communication Edge Hard Disk Drive App store Surge Protector Microblogging Microsoft Excel Hiring/Firing Adobe Human Resources IT consulting Ciminal File Sharing Smart Technology Mobile Device Applications Robot Reliable Computing Project Management Compliance Identity Webinar Images Distributed Denial of Service Advertising Bloatware Evernote Scalability Licensing Experience Data storage Community IT budget iOS Inbound Marketing Data Privacy Legislation Scam PDF ISP Intrantet Workers Upgrades Files How To Computer Fan Tablets Music Branding Blogging Chromebook Tutorial Screen Mirroring Debate Comparison Employer Employee Relationship Help Desk SaaS Text Messaging Mouse Updates Consultant HBO Chromecast NFL Books Touchpad WIndows 7 Identities Printing Cast Specifications Network Congestion