Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Technology: Computer Forensics

Know Your Technology: Computer Forensics

Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.

What Are Computer Forensics, and What Are They Used For?
Computer forensics is generally considered the application of special processes and techniques that can be used to analyze information on a computer or network. Forensics are also generally meant to protect evidence that could potentially be used in a trial. Once the warrant required has been issued, a forensic technician will go on-site to isolate the device from the Internet or other attached networks that could influence its contents. They then copy over every file on the device and dig through them for anything of note. It’s important that the investigator makes a copy of each file so that the original evidence can be preserved. Even something as simple as accessing a file can lead to slight alterations, making the evidence of little consequence in a court of law, civil or criminal case.

Computer forensics can be used for any number of different cases. Depending on the nature of the crime, any device could be used to obtain evidence of what is, was, or will be happening. These types of investigation take an extremely close look at the data, including not just the files that are currently there, but at the metadata for just about any items on the device. This includes looking at when the file was first created, when it was edited and saved, and who might have been the one to carry out these actions.

This process can be used to solve any number of cases. Here are just a couple to look at as an example:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Law enforcement agencies are certainly not the only ones that place an emphasis on computer forensics. There are many others that also have accredited laboratories. You might be surprised to hear about a couple of these, as they include Walmart, American Express, and Target (which is kind of hilarious in the wake of the Target data breach not too long ago). There are also numerous independent labs that, while lacking accreditation, can potentially outperform law enforcement agencies under the right conditions.

Independent labs are often onboarded by law enforcement to help with crime solving. The perfect example of this is Target, whose labs have helped with “felony, homicide, and special-circumstances cases” in the past. These claims come from a spokesperson who, in 2008, claimed that about a quarter of cases managed by Target’s forensic laboratory were external and had nothing to do with the company itself.

How Does Your Technology Compare?
If your organization would like a team on your side to ensure that security is always a top priority, reach out to Excedeo at 619.398.4100. We aren’t a dedicated computer forensics agency, but we know all about network security and compliance issues.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 16 August 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Management Business Computing Hackers Google Efficiency Productivity Hosted Solutions Backup Managed Service Provider Business Innovation Malware windows Workplace Tips User Tips Hardware Mobile Devices Computer IT Support IT Services Saving Money Upgrade Miscellaneous Network Security Email Virtualization Windows 10 Gadgets Communication Business Continuity Apps Data Smartphones Disaster Recovery Microsoft Office Server Network Mobile Device Management VoIP Information Technology Mobile Computing Smartphone Productivity Small Business Quick Tips Tech Term Health Browser Social Media Going Green Operating System Android Cybersecurity Mobile Office Passwords Holiday Chrome App Alert Cybercrime Best Practice Application Office Save Money BYOD Managed IT Services Marketing Collaboration Ransomware Law Enforcement spam The Internet of Things Tablet Search Data Backup Wearable Technology communications Office 365 Employer-Employee Relationship Apple Vendor Management WiFi Remote Computing Router iPhone Wireless Technology Money BDR Hacking Risk Management Cost Management Facebook Data Recovery User Error Phishing Outsourced IT Remote Monitoring Maintenance Antivirus Unified Threat Management Avoiding Downtime History Users Data Security Bring Your Own Device Tech Support Big Data Office Tips Password Hard Drives Government Data Management Computers Social Saving Time Telephone Systems Internet of Things Customer Relationship Management Mobility IT Solutions Two-factor Authentication Outlook Update Gmail Unsupported Software USB Encryption IT Support PowerPoint Cloud Computing Wi-Fi Analytics OneNote Shortcut Proactive IT Vulnerability Firewall Social Networking Bandwidth Lithium-ion battery Google Drive Current Events VPN Humor Website Net Neutrality Phone System Automation Wireless Printer Information Work/Life Balance Excel IT COnsultant Windows 10 Politics Streaming Media Travel Computer Repair Trending Audit Networking Social Engineering Intranet Virus Laptop Augmented Reality Content Filtering administration Artificial Intelligence Managed IT Budget Disaster Recovery Blockchain Education Television Retail Identity Theft Managed IT Services Save Time Data Protection Managing Stress Fax Server Computer Care Storage Google Assistant Computing Devices Legal Hosted Solution Transportation Commerce Patch Management End of Support Business Intelligence Meetings Flexibility Telephony Customer Service Fraud Biometrics Google Docs Private Cloud Virtual Reality Online Currency Data Storage HIPAA Wireless Charging Internet Exlporer Uninterrupted Power Supply Sales Mobile Security Hard Drive DDoS WannaCry Data Breach Instant Messaging Emails Applications Point of Sale Printer Server Cortana Sports Entertainment Samsung Benefits eWaste Battery Programming Computer Accessories Twitter Personal Information SaaS Automobile Value Cleaning Amazon Windows 8 Paperless Office HaaS Microsoft Word Reputation Regulations Language Word Bluetooth Worker Commute Administrator Ebay junk Solid State Drive Conferencing Settings Device Security Keyboard IT Management hacker Cameras Software as a Service User Lifestyle Windows Ink SharePoint Video Games Access filter Computer Forensics Hard Disk Drive Gifts Hiring/Firing WIndows Server 2008 Virtual Desktop Presentation Best Available Proactive Google Maps Teamwork Science Management Credit Cards Spyware Smart Technology 3D Printing Websites Surge Protector Mobile Device Data Loss Robot Wireless Internet FAQ Sync Buisness Advertising Nokia Gift Giving Data Theft Running Cable Scalability Charger Experience Data storage Youtube Gamification iOS Edge Scam PDF Near Field Communication Microblogging App store Upgrades Microsoft Excel How To Computer Fan Music Memory Community Screen Mirroring Ciminal Employer Employee Relationship Adobe Human Resources Text Messaging IT consulting ISP Consultant File Sharing Books Intrantet Touchpad Financial Cast Project Management Reliable Computing Distributed Denial of Service Black Market Blogging Compliance Webinar Identity Tutorial Images Touchscreen Monitors Evernote Electronic Medical Records Bloatware Hybrid Cloud IT budget Licensing Inbound Marketing Data Privacy Webinar Legislation Nanotechnology Workers Files Safety Operating Sysytem Virtual Assistant Co-managed IT Training Tablets Branding Mouse Display Debate Chromebook Help Desk IT solutions Comparison Root Cause Analysis Updates Chromecast HBO Alexa for Business WIndows 7 Identities Company Culture NFL OneDrive Network Congestion Printing Print Server Windows 10s Specifications