Author Topic: Computer Forensics 101  (Read 1127 times)

0 Members and 1 Guest are viewing this topic.

Offline sithari

  • ෆැන්ටසි රාළ FNLeader
  • *****
  • Posts: 783
  • Gender: Female
  • Forgive and Forget
Computer Forensics 101
« on: August 10, 2006, 02:30:16 PM »
Advertisement
Computer Forensics 101


By Susan Steen and Johnette Hassell, Ph.D.
Electronic Evidence Retrieval, LLC
www.electronicevidenceretrieval.com


Thirty years ago computers were colossal machines utilized only by government agencies and prodigious corporations. These early machines were so large and complex that they required their own temperature-controlled rooms in order to function properly. Since that time they have metamorphosed into ordinary domestic devices that are as much a part of our daily lives as the telephone or the television. Because Americans use personal computers to communicate, work, learn, plan, and entertain, we have come to view our PCs as extensions of ourselves. For this reason, computers often contain important information, which can be used as evidence in legal proceedings, even if the information is not directly related to computers. This computer-based evidence can be anything from e-mail, to photographs, to confidential documents. Most importantly, the data frequently can be retrieved from a suspect computer, even if the user has deleted the information, defragmented the drive, or even reformatted the drive.
Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter.

Computer forensics can be used to uncover potential evidence in many types of cases including, for example:

- Copyright infringement
- Industrial espionage
- Money laundering
- Piracy
- Sexual harassment
- Theft of intellectual property
- Unauthorized access to confidential information
- Blackmail
- Corruption
- Decryption
- Destruction of information
- Fraud
- Illegal duplication of software
- Unauthorized use of a computer
- Child pornography

Computer forensics combines specialized techniques with the use of sophisticated software to view and analyze information that cannot be accessed by the ordinary user. This information may have been "deleted" by the user months or even years prior to the investigation, or may never have been saved to begin with - but it may still exist in whole or in part on the computer's drive.
4give & 4get