Author Box
Articles Categories
All Categories
Articles Resources

Computer Forensics, Computer Crimes, and Data Recovery

June 13, 2012 | Comments: 0 | Views: 156

Computer Forensics

Computer forensics is the science of obtaining information from computers and digital media. This information is usually intended to be used as legal evidence. The aim of the computer forensic analyst is twofold. First, he or she must retrieve data from the computer discs and other digital media in question. Then the data must be stored. It must be stored in a manner that is safe and that allows the analyst to affirm that it was found on the original device. A computer forensics specialist must be expert in both the technology of data recovery and the legal aspects of evidence handling.

Computer Crimes

Computer forensics is a relatively new science. Before the 1980s, there were no personal computers and therefore no computer crimes. Now computers figure in a wide variety of illegal activity, both directly and in the form of an information storage medium.

There are some crimes in which computers are directly involved. One of these is hacking into corporate and government websites. Hackers may try to obtain information like customer's credit card or bank account information. They may try to embarrass government agencies and prevent the access of citizens by shutting down websites or posting false information. Another crime is that of abuse in chat rooms and social media sites. This may take the form of bullying, encouraging others to attack a person or spreading false information about someone to damage their reputation.

In other crimes, the computer is not used in committing the crime itself. It is used to store information that may be used as evidence of the crime. This might include journals of criminal activity, spread sheets with financial information or emails.

Another category of computer crime might be considered to be one in which the computer is not absolutely necessary for the crime, but makes it much easier and more likely to be committed. Crimes of this nature might include storing child pornography or attempting to solicit meetings with minors.

Data Recovery Techniques

The main mission of the computer analyst is data recovery. There are several techniques that might be used:

Live Recovery - If the computer is seized while it is still running, or is shut down but operational, live recovery may be used. This may involve searching the hard drive of the computer using the installed operating system or third-party software.

Deleted File Recovery - Many people do not realize that when files are deleted from a computer, they are seldom actually removed from the hard drive. When the delete function is used, all this does is remove the file's location from the computer's file location list. Software is available to recover these files in most cases. Even if the hard drive has been erased, the data is often still there.

Steganography - This is an interesting method of hiding data in which the information is mixed into an image. The data may also be intermixed with the coding of a computer file.

Computer forensics is a fascinating science. Its practitioners must be part computer expert, part evidence handling specialist and part detective.

To learn more about Electronic Evidence Discovery Services, as well as more information about computer forensics, visit Elluma Discovery.

Source: EzineArticles
Was this Helpful ?

Rate this Article

Article Tags:

Computer Forensics


Computer Crimes


Data Recovery

Windows 8 will change the way you work and play, says Microsoft and we agree. Nearly all of the previous iterations of the Windows OS have been evolutionary but Windows 8 is set to change all that.

By: Sakshi Sharma l Computers & Technology > Mobile Computing l April 03, 2013 lViews: 662

Many antivirus programs available today have various features but it entirely depends on the user to make the best choice from among these different computer virus protection programs online. Before

By: Alex l Computers & Technology > Software l December 28, 2012 lViews: 370

You can add a new color to your entertainment life with iskysoft video converter for mac & iskysoft dvd creator for mac and make your Christmas holidays all the more special. iskysoft video

By: Zaithyn Galter l Computers & Technology > Software l December 23, 2012 lViews: 1070

The choices you make regarding the type of recruiting software you choose to use are important. Being an informed consumer is essential to getting a system or components that complement systems of

By: Maria Warne l Computers & Technology > Software l December 14, 2012 lViews: 306

The Cisco certification has become the most popular IT training in recent days and it offers three different levels of these certifications include as: associate, professional and expert-level.

By: sandidas chakma l Computers & Technology > Certification Tests l December 11, 2012 lViews: 236

Millions of prospective 12th standard students are gearing up their preparations for the Joint Entrance Exam for engineering seats. From 2013, it has been decided by the IITs, CBSE, JEE organizing

By: Sarkariexam l Computers & Technology > Certification Tests l December 07, 2012 lViews: 633

Users of the game Diablo III have had many of their online valuables wrongfully stolen from them. Some of the valuables consist of online currency and precious hard to obtain gear.

By: David Kyl Computers & Technology > Computer Forensicsl June 21, 2012 lViews: 156

SCADA typically refers to computer based industrial control system which basically aids to monitor and control facility based industrial processes and infrastructure. Here industrial processes

By: Ananta Modakl Computers & Technology > Computer Forensicsl June 20, 2012 lViews: 183

The reason why the PCI DSS is often seen as overly prescriptive and over-bearing in its demands for so much security process is that card data theft still happens on a daily basis. What's more

By: Mark Kedgleyl Computers & Technology > Computer Forensicsl June 20, 2012 lViews: 150

An important part of an private investigation can be preliminarily accomplished with nothing more than a telephone, reliable laptop and an Internet connection. Conducting thorough and successful

By: Joseph C Gioconda, Esql Computers & Technology > Computer Forensicsl June 14, 2012 lViews: 253

The best SEO companies provide e-marketing services. These firms train online businesses specifically small-scale proprietors to sell their merchandise in a highly cost effective way to intended

By: Roy Allensl Computers & Technology > Computer Forensicsl June 12, 2012 lViews: 152

When an individual (known as a Registrant) creates and registers a new Internet domain name, he leaves clues, pieces of a large complex data puzzle, behind. Understanding and interpreting these clues

By: Joseph C Gioconda, Esql Computers & Technology > Computer Forensicsl June 11, 2012 lViews: 148

Discuss this Article

comments powered by Disqus