What is computer forensics? - Computer forensics is the generally accepted name that is used by the industry to call the analysis and reporting of the findings of forensic analysis of all computer related and other digital media.
It covers not only Personal Computers, laptops, or server hard drives but also includes other digital storage devices like usb flash drives, digital music players, memory cards, phone SIM cards and data gathered from analyzing a network.
All computer operating systems can be subjected to forensic analysis. This can range from Microsoft’s DOS and Windows operating systems, to MAC and Unix systems as well as the more obscure and esoteric ones. The rule of thumb is that any data stored digitally can be analyzed via forensic methods.
Identifying Source Of Potential Evidence
A lot of electronic devices have memory modules that require continuous power in order to retain the stored information. These data can easily disappear if the power is lost whether by unplugging the power source if it relies on AC power or by letting the battery completely lose its charge. This is why computer forensics experts are very careful to identify these memory modules and determine whether special methods are needed to be implemented in order to completely download the stored data for forensic analysis. This is called identifying the source of potential evidence.Take for example the case of a standard computer system. A computer consists of a central processing unit, memory storage devices, a monitor, a keyboard and a mouse. The system can either function as a standalone unit or be connected to the internet. Computer systems can have dozens of configurations from desktops. Laptops, server racks and even microcomputer systems. They are used for all kinds of computer functions as well data storage.
When doing forensic analysis on a standard computer system, the potential evidence is usually found in files stored in the memory storage devices like hard drives, flash drives and other storage media.
Examples of potential evidence are user created files like address books, email files, audio and video files, digital photographs, calendar entries, internet histories, spreadsheet files and text files. User protected files has a high potential of being a huge source of evidence.
These files are zip files that require a password or encrypted files that need both a private and public key. Most of the time, computer forensics experts devote a lot of their resources towards recovering deleted files from a suspect’s computer. Computer data deletion protocols don’t really completely erase files and computer forensics experts can easily find these deleted files.
This is just a short overview on what is computer forensics. If you wish to learn more about the subject and field, you can do more research in this yourself.
No comments:
Post a Comment