Rounded avatar PrepNotes

Digital Forensics

Explain the term computer forensics in detail.

Computer Forensics

Computer forensics is the collection, preservation, analysis, and presentation of computer-related evidence. It involves performing a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it.

Computer forensics is also referred to as computer forensic analysis, electronic discovery, electronic evidence discovery, digital discovery, data recovery, data discovery, computer analysis, and computer examination.

Types of Computer Forensics

Computer forensics always involves gathering and analyzing evidence from digital sources. Some common types include:

  • Database forensics: Retrieval and analysis of data or metadata found in databases.
  • Email forensics: Retrieval and analysis of messages, contacts, calendars, and other information on an email platform.
  • Memory forensics: Retrieval and analysis of data stored on a computer's RAM (random access memory) and/or cache.
  • Network forensics: Use of tools to monitor network traffic, such as intrusion detection systems and firewalls.
  • Malware forensics: Analysis of code to identify malicious programs like viruses, ransomware, or Trojan horses.

Characteristics

  • Identification: Identifying what evidence is present, where it is stored, and how it is stored.
  • Preservation: Data is isolated, secured, and preserved.
  • Analysis: Forensic lab personnel reconstruct fragments of data and draw conclusions based on evidence.
  • Documentation: A record of all visible data is created to help recreate and review the crime scene. All findings from the investigations are documented.
  • Presentation: All documented findings are produced in a court of law for further investigations.

Computer Forensics Services

  • Media Conversion: Computer forensics experts should extract relevant data from old and unreadable devices, convert it into readable formats, and place it onto new storage media for analysis.
  • Document Searches: Computer forensics experts should be able to search over 200,000 electronic documents in seconds rather than hours, making the discovery process less complicated and less intrusive.
  • Recovery: Using proprietary tools, experts should recover and analyze otherwise inaccessible evidence, aided by their advanced understanding of storage technologies.
  • Expert Witness Services: Experts should explain complex technical processes in an easy-to-understand fashion to help judges and juries comprehend how computer evidence is found, what it consists of, and its relevance.
  • Data Seizure: Experts should track down evidence using their knowledge of data storage technologies and assist officials during the equipment seizure process.
  • Data Duplication/Preservation: Experts should make an exact byte-for-byte copy of the original before working on it to preserve the integrity of the evidence and ensure a smooth investigation.
  • Electronic Surveillance: Experts may set up systems, monitor premises, or analyze video footage using sophisticated forensics tools.
  • eDiscovery: The process of collecting vital information and evidence relevant during litigation.
  • Other Miscellaneous Services: These include analysis of computers and data in criminal and civil investigations, on-site seizure of computer data, assistance in preparing electronic discovery requests, reporting in a comprehensive manner, court-recognized expert witness testimony, and fast turnaround time.