Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Technology: Computer Forensics

Know Your Technology: Computer Forensics

Have you ever wondered where the commonly accepted perception of cyber investigations comes from? You might be surprised to find out that the world of suits, ties, and data terminals is far from the reality of what these investigations are--or, at least, considerably more dramatic. For today’s tech term, we’re going to get to the bottom of this by investigating what computer forensics really looks like.

What Are Computer Forensics, and What Are They Used For?
Computer forensics is generally considered the application of special processes and techniques that can be used to analyze information on a computer or network. Forensics are also generally meant to protect evidence that could potentially be used in a trial. Once the warrant required has been issued, a forensic technician will go on-site to isolate the device from the Internet or other attached networks that could influence its contents. They then copy over every file on the device and dig through them for anything of note. It’s important that the investigator makes a copy of each file so that the original evidence can be preserved. Even something as simple as accessing a file can lead to slight alterations, making the evidence of little consequence in a court of law, civil or criminal case.

Computer forensics can be used for any number of different cases. Depending on the nature of the crime, any device could be used to obtain evidence of what is, was, or will be happening. These types of investigation take an extremely close look at the data, including not just the files that are currently there, but at the metadata for just about any items on the device. This includes looking at when the file was first created, when it was edited and saved, and who might have been the one to carry out these actions.

This process can be used to solve any number of cases. Here are just a couple to look at as an example:

  • Intellectual Property Theft and Industrial Espionage
  • Employment Disputes
  • Bankruptcy Investigations
  • Inappropriate Email and Internet Usage in the Workplace
  • Regulatory Compliance
  • Forgeries and Fraud Investigations

Alternative Sources of Analysts
Law enforcement agencies are certainly not the only ones that place an emphasis on computer forensics. There are many others that also have accredited laboratories. You might be surprised to hear about a couple of these, as they include Walmart, American Express, and Target (which is kind of hilarious in the wake of the Target data breach not too long ago). There are also numerous independent labs that, while lacking accreditation, can potentially outperform law enforcement agencies under the right conditions.

Independent labs are often onboarded by law enforcement to help with crime solving. The perfect example of this is Target, whose labs have helped with “felony, homicide, and special-circumstances cases” in the past. These claims come from a spokesperson who, in 2008, claimed that about a quarter of cases managed by Target’s forensic laboratory were external and had nothing to do with the company itself.

How Does Your Technology Compare?
If your organization would like a team on your side to ensure that security is always a top priority, reach out to Velocity Technology Partners at (800) - 983 - 5765. We aren’t a dedicated computer forensics agency, but we know all about network security and compliance issues.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, July 16 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Retail Technology App Device Security Emergency Office 365 Antivirus Android Browser Data Management File Sharing Managing Stress Management Fraud Server Update Data Privacy Security Data Backup Tablets Gifts Cloud Data Security Wireless Internet Internet Spyware Identity Sports Holiday Flexibility VPN Computer Forensics intranet Operating System Printing Politics Ciminal WIndows Server 2008 Connectivity Hackers App store Cortana Collaboration Employer-Employee Relationship Cloud Computing Privacy PowerPoint Alert Business Continuity Telephone Credit Cards Innovation Licensing Specifications Cost Management Communication Hosted Solutions Network Thank You Tech Term WannaCry Two-factor Authentication IT Services Identities Cybercrime Remote Computing Phishing History Edge Managed IT Services Proactive IT Wireless Charging Ransomware Personal Information Software as a Service Malware Education Virtualization Smart Tech Devices Identity Theft Vulnerability Streaming Media Tech Support Smartphones Outsourced IT Workers Adobe Value Managed IT services Memory Wi-Fi eWaste Shortcut Applications Storage Business Network Security IT support Automation Smartphone Patch Management Encryption Updates Money Email MSP Data Protection Cybersecurity Backup Lifestyle IT budget User Error Application Language Charger Gadgets Remote Monitoring Router Data Loss Monitoring Chromebook Hybrid Cloud The Internet of Things Gamification Company Culture Business Management Outlook Hardware Google Docs Financial Chrome Big Data Evernote Blockchain Gmail Best Practices Disaster Recovery Computing iPhone Best Practice Redundancy Social Media Hosted Solution Productivity Mobile Device Management Word Telephone Systems Apple Artificial Intelligence IoT Business Computing Financial Technology Virus Microsoft Word SaaS Google Microsoft Data Recovery Google Assistant Wireless Technology Internet of Things Unified Communications Computer Mobility Tip of the Week User Tips IT Management Hard Drive Managed IT Efficiency Government Spam Excel OneNote Compliance Commerce Microsoft Office Windows 10 Content Filter Maintenance Analysis IT Support Legislation Unsupported Software Work/Life Balance FAQ Bring Your Own Device Networking Cast Mobile Devices Twitter Google Drive Risk Management Apps Cleaning Safety HBO Google Maps Microsoft Excel Sales Softphones Websites Conferencing Congratulations Sync Computers Data Theft Windows Marketing Law Enforcement Communications Managed Service Provider Legal Travel Content Filtering IT Solutions Vendor Management Proactive Screen Mirroring Audit Students BYOD Project Management Data Passwords Mobile Security VoIp NFL Social Engineering BDR Data Storage Comparison Small Business WiFi Saving Money Data Breach Software Windows Ink