MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Technology: Computer Forensics

Know Your Technology: Computer Forensics

Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.

What Are Computer Forensics, and What Are They Used For?
Computer forensics is generally considered the application of special processes and techniques that can be used to analyze information on a computer or network. Forensics are also generally meant to protect evidence that could potentially be used in a trial. Once the warrant required has been issued, a forensic technician will go on-site to isolate the device from the Internet or other attached networks that could influence its contents. They then copy over every file on the device and dig through them for anything of note. It’s important that the investigator makes a copy of each file so that the original evidence can be preserved. Even something as simple as accessing a file can lead to slight alterations, making the evidence of little consequence in a court of law, civil or criminal case.

Computer forensics can be used for any number of different cases. Depending on the nature of the crime, any device could be used to obtain evidence of what is, was, or will be happening. These types of investigation take an extremely close look at the data, including not just the files that are currently there, but at the metadata for just about any items on the device. This includes looking at when the file was first created, when it was edited and saved, and who might have been the one to carry out these actions.

This process can be used to solve any number of cases. Here are just a couple to look at as an example:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Law enforcement agencies are certainly not the only ones that place an emphasis on computer forensics. There are many others that also have accredited laboratories. You might be surprised to hear about a couple of these, as they include Walmart, American Express, and Target (which is kind of hilarious in the wake of the Target data breach not too long ago). There are also numerous independent labs that, while lacking accreditation, can potentially outperform law enforcement agencies under the right conditions.

Independent labs are often onboarded by law enforcement to help with crime solving. The perfect example of this is Target, whose labs have helped with “felony, homicide, and special-circumstances cases” in the past. These claims come from a spokesperson who, in 2008, claimed that about a quarter of cases managed by Target’s forensic laboratory were external and had nothing to do with the company itself.

How Does Your Technology Compare?
If your organization would like a team on your side to ensure that security is always a top priority, reach out to MERIT Solutions at (757) 420-5150. We aren’t a dedicated computer forensics agency, but we know all about network security and compliance issues.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Computer Managed IT Services Mobile Devices Disaster Recovery Outsourced IT Microsoft VoIP Business Continuity Business communications IT Support Windows 10 Innovation Cybersecurity Email User Tips Hardware IT Services Data Backup Efficiency Cybercrime Managed IT Server Small Business Ransomware Apps Mobility Windows Saving Money Data Recovery Mobile Device Management Tech Term browser Data Law Enforcement Internet of Things Smartphone Operating System Productivity Android Virtualization Telephone Systems BDR Save Money Office 365 Passwords Phishing Cloud Computing Money Data Security Smartphones Hosted Solution Quick Tips BYOD Automation Password Holiday Managed Service Provider Information Technology Chrome Communication Recovery VPN Microsoft Office Vulnerability Risk Management Google Drive Hacking Unsupported Software Avoiding Downtime Update Gadgets Alert Health Miscellaneous Data Breach Computers Work/Life Balance Cost Management Wi-Fi Social Media Application Social Best Practice upgrade App Budget Collaboration IT Support Data Management Network Two-factor Authentication Facebook Wireless Government Wireless Technology Gmail Spam Identity Theft Telephony Managed IT Services Workplace Tips Artificial Intelligence Flexibility Shortcut Office tips Applications Private Cloud History Social Engineering Remote Computing Firewall Streaming Media Proactive IT Antivirus Current Events The Internet of Things Audit search Data Protection Compliance Employer-Employee Relationship Personal Information Politics User Error Tech Support USB Cleaning Save Time Computer Care Phone System Legal Encryption Wireless Charging Excel Users iPhone Data Storage IT solutions Mobile Computing Transportation Project Management OneNote DDoS Big Data Robot Television Education End of Support Vendor Management Router Data Loss Apple SaaS Marketing Samsung Google Docs Management WiFi Content Filtering Battery Blockchain Humor HaaS Going Green Disaster Bandwidth eWaste Mobile Security Redundancy Devices Automobile Value Commerce Sports Google Assistant Cortana Saving Time Fraud Patch Management Windows 10 Hacker Office Solid State Drive Internet Exlporer Hard Drive Lifestyle stock Business Intelligence Touchscreen Video Games Virtual Reality Access PowerPoint Charger Edge Outlook Relocation Scam Virus Word Chromebook Legislation tweet Managed IT Service Music Wireless Internet Ciminal iOS Employer Employee Relationship PDF Proactive Windows Ink calculator Smart Tech Comparison Twitter Analytics Instant Messaging Gamification Evernote Regulation control Keyboard Computer Fan Computer Accessories Text Messaging Worker Commute Websites Google Maps Connectivity Specifications WSJ Mobile Device Screen Mirroring Managing Stress Memory Networking MSP Sync Exchange Dark Web Meetings Distributed Denial of Service Data Theft Software as a Service altivista Content Filter Sales Cast Books Emails Scalability Students Workers intranet Adobe SBS Hiring/Firing Settings Laptop Uninterrupted Power Supply Computing compaq Monitoring Retail How To Unified Communications Updates Wearable Technology IT budget Licensing Benefits WannaCry Touchpad Analysis hp Conferencing Maintenance Unified Threat Management HBO Webinar Reputation Advertising Financial Microsoft Word Mobile domain Training Remote Monitoring Entertainment App store Microsoft Excel Financial Technology Gifts Device Security Upgrades Electronic Medical Records IT solutions Point of Sale Data storage Identities Professional Services remote File Sharing Yahoo Company Culture HIPAA Chromecast Printing Consultant IT Management Safety Windows 10s Administration Black Market Nanotechnology Running Cable IoT Travel Server 2008 Smart Technology Storage Ali Rowghani Avoid Downtime Identity Trending Credit Cards Spyware WIndows Server 2008 Hard Disk Drive Colocation Shadow IT Root Cause Analysis Hard Drives Document Management Language Tablets Data Privacy Experience Files Administrator Computer Forensics FAQ Lithium-ion battery Augmented Reality NFL server installation dvd "cannot install required files" Thank You Worker Congratulations CrashOverride Cache Monitors Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...