About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Alternative IT Solutions Blog

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

What are Computer Forensics, and What Are They Used For?
Computer forensics can be defined as the application of certain specialized techniques to locate and analyze the information on a computer or computer system, protecting it for use as evidence in a trial. Once the requisite warrants have been acquired, a forensic technician is tasked with isolating the device from outside influence by disconnecting it from the Internet before copying every file and poring over their contents for evidence.

The investigator must make a copy of these files so as to preserve the original evidence. Accessing a file can be enough to change it slightly, potentially rendering their evidence inadmissible.

Computer forensics can be leveraged in a wide variety of cases, as any given device may contain evidence of a crime to be, or that was, perpetrated, as well as effectively be the scene of the crime itself. An investigation dives deep, not only focusing on the presence of files, emails, or other documents pertinent to the case on the device, but also on an analysis of these items’ metadata, as it reveals when data appeared on a computer, when it was edited and saved last, and who the user was that carried out these actions.

These methods have been used to crack cases involving a dirty laundry list of crimes, as this sample of their uses suggests:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Of course, law enforcement are not the only bodies that maintain and utilize computer forensics labs. Six major companies, including Walmart, American Express, and Target, have accredited laboratories, and there are countless other independent labs that have not been accredited. These in-house labs can often outperform traditional law enforcement groups, as they are better able to keep their solutions on the cutting edge.

In fact, these labs are often recruited by law enforcement to assist in solving crimes. Target’s labs have announced in the past that they have assisted with “felony, homicide, and special-circumstances cases” on a volunteer basis for years, a spokesperson claiming in 2008 that a full quarter of cases worked by Target’s laboratory had nothing to do with the company.

How Does Your Technology Compare?
If you want a team on your side that will take as much care to protect your solutions as a computer forensics team does to track down cybercrime, give Alternative IT Solutions a call at (0)20 8498 4300.

Is Your Cloud Solution Actually a Money Pit?
Monitoring and Automation Make for a More Secure S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, September 20, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Network Security Email Tech Term Data Backup Hackers Malware Google Managed IT Services VoIp Microsoft Cloud Computing Managed IT Services Outsourced IT Innovation Mobile Devices Hosted Solutions Data Recovery Software Data Internet IT Support Android User Tips Hardware Backup Efficiency Internet of Things Communication Small Business Saving Money IT Services Artificial Intelligence Ransomware Communications BDR Network Cybercrime How To Cybersecurity Alert Smartphones Windows Two-factor Authentication Collaboration Browser Windows 10 Productivity Business Management Business Continuity Router Gadgets Chrome Money Mobile Device Management Data Security Smartphone Computers Applications Data Protection Phishing Business Managed IT Server Vulnerability Telephone Systems Office 365 Remote Monitoring Disaster Recovery Facebook Connectivity IT Management BYOD Identity Theft Business Intelligence Workplace Tips Save Money Social Media Spam Word Social Engineering Managed Service Website Virtualization Windows 7 Password Virtual Assistant Content Management Upgrade Comparison Firewall VPN Data Storage Paperless Office Operating System Blockchain Passwords OneNote Settings Bring Your Own Device Spam Blocking Document Management Avoiding Downtime Law Enforcement Value Miscellaneous Update Microsoft Office Work/Life Balance Wi-Fi Mobile Computing Encryption Employer-Employee Relationship Apps Compliance Private Cloud Workers App Holiday Networking Credit Cards Computer Information Sports Training Infrastructure Budget Mobile Device IT Plan CES Servers Unsupported Software Data Breach Redundancy Staff Smart Office Cortana Authentication Botnet Risk Management Cache Current Events Wireless Charging Outlook HVAC Skype Supercomputer Amazon The Internet of Things Software Tips Augmented Reality Entertainment Automation webinar Sync Content Filtering Charger NIST eWaste Telecommuting Recovery Digital Signature Scam Google Apps Meetings Patch Management Password Manager Nanotechnology Travel Samsung Telephone System Wireless Internet Knowledge Government Frequently Asked Questions Practices Specifications Unified Threat Management Amazon Web Services Electronic Medical Records Black Market Remote Worker Accountants Machine Learning Conferencing Information Technology Lifestyle Cryptocurrency Remote Work Solid State Drive PDF Office Tips Leadership Voice over Internet Protocol Hiring/Firing Flash Big Data Windows 10s Telephony HIPAA USB Network Congestion Downtime Excel Hosted Computing Start Menu Millennials Safe Mode Legal Marketing Online Shopping Physical Security Wiring YouTube Regulations Cleaning Audit Data loss Business Mangement Devices Data Management Wire HaaS IT Support Root Cause Analysis Tip of the week Inventory Tools Workforce Computer Care Google Drive File Sharing Criminal Addiction Mobility Evernote Netflix Proactive IT Mobile Data Warehousing Multi-Factor Security Screen Mirroring Enterprise Content Management Gmail Thought Leadership Public Cloud Human Resources IT Consultant Google Docs Theft Windows Server 2008 Access Control SaaS Software as a Service Keyboard FENG HBO Smart Tech Bandwidth Flexibility IBM Professional Services Fraud Computer Fan MSP Trending Cast Password Management Recycling Consultation Television Camera Insurance Content Filter Thank You Instant Messaging Public Computer Loyalty Quick Tips Fiber-Optic Printers Storage Safety Computer Accessories Congratulations Bata Backup Proactive Education Business Owner Windows 10 Cables Rootkit Twitter Automobile Bluetooth Two Factor Authentication Remote Monitoring and Maintenance Students Employer Employee Relationship Vendor Management VoIP Regulation WiFi Unified Communications Worker GDPR IoT Company Culture Office Line of Business Strategy Healthcare Health Help Desk Assessment Save Time Business Technology Managed Service Provider E-Commerce Managing Stress Analysis Electronic Health Records Hacking Battery Streaming Media

Latest News & Events

Alternative IT Solutions is proud to announce the launch of our new website at https://www.alternative-IT.co.uk. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Alternative IT Solutions can do for your business.

Call Us Today
Call us today
(0)20 8498 4300

Avocet House, Trinity Park, Trinity Way
London, England E4 8TD