Share


Share

Share it !



share/bookmark
Showing posts with label Forensics. Show all posts
Showing posts with label Forensics. Show all posts

Computer Forensics and Computer Security Consulting as a Career?


The other day an acquaintance mentioned to me that he'd like to start a new business in the computer forensics trade, and make it his new life's work. Does that make sense? Well, sure it does, and just because everything is moving into the cloud, or so it is predicted doesn't necessarily mean that folks who are trying to hide something would dare to store stuff there. After all, it would be easily searchable by the authorities, or some NSA searching algorithm will find it.

Thus, those using computers to help them break the law are more likely to keep information close to the vest on encrypted CD ROMS, hard drives, thumb drives, etc - kind of like Osama bin Laden did. And then there is another aspect to the computer forensics business, and that is recovering lost data for businesses. Therefore, I explained to him that I agree that computer forensics, and consulting are a good business to be in - smart idea.

In fact, I have a friend who had a computer consulting business, and did quite well, but had challenges when he took on the wrong partner, and they both had different ideas on how to run the business, so they split it into two, hardware sales/computer repair and consulting/networks. Just be careful if you take on partners, was his advice. I'd say that advice would definitely go for the computer forensics sector as well.

And, speaking of computer forensics, I sure could have used him a few years ago, when my hard drive crashed, and I lost 4 eBooks I was working on, which like a dummy I hadn't backed up. That was terrible. And that same year I had my MS operating system screw up, and when I re-booted I lost a ton more, lots of import ideas, concepts, and half completed articles I was thinking on. People really need computer forensics, and data recovery, and Corporations really need to trace back how the hackers get in to provide safe data security too.

I'd say there is a ton of work to be done + potential contracts with law-enforcement I'd say, as well. Good be quite a lucrative business I'd say? Indeed, maybe my acquaintance is quite wise in his desire to start such a business, maybe that is a smart industry to get into, and with the right connections, it ought to be a very awesome business. Well, that's all for now, something to think on. If you have any more questions or comments on the computer forensics industry please shoot me an email.




Lance Winslow is a retired Founder of a Nationwide Franchise Chain, and now runs the Online Think Tank. Lance Winslow believes writing 23,777 articles by 7 PM on June 27, 2011 is going to be difficult because all the letters on his keyboard are now worn off now..




Computer Forensics - A Beginner's Guide


Computer forensics is a new and growing specialty that serves both the public and private sectors. IT forensics specialists are not only competent in software related matters, but in those relating to computer hardware issues as well. Computer forensics comes into play in both ethical and criminal issues, including intellectual property law, theft, and fraud. There was a time when those people committing computer crimes weren't at risk from the law - now they are.

These forensics follows traditional principles for scientific investigation. Work in computer forensics is systematic, well recorded and documented, and acceptable within a court of law. The methodology of computer forensics follows several steps. The first is to identify sources of digital evidence. The second is to preserve that evidence from loss, change or corruption. The third step in the process is to analyze the evidence, and the fourth is to present the evidence within the context it is required.

A good forensic specialist can manage the computer system and the data it contains while protecting sensitive evidence. Computer forensics explores both the individual computer, and any relevant networks or server connections. Forensics allows for the discovery of obvious and hidden data, as well as allowing access to password protected, encrypted and otherwise secured data on a computer system. Forensics may also allow for the recovery of deleted files.

As a matter of fact a lot of modern IT forensics work involves recovering files that have been deliberately deleted from computers and cellphones. The drugs trade relies on cellphones to communicate but now they're realizing that a good forensics team can retrieve information on every text message and phone call they've ever made.

You can think of these specialist forensic teams as like the ultimate data recovery specialists. No matter what lengths the guilty have gone to trying to hide the evidence of their crimes these guys can find it and use it against them in court. An example is the guy who set his laptop on fire but realized it was going to take forever to burn. So he threw the laptop into a river and figure that was enough.

It wasn't. Police were able to recover the laptop and almost all the data from his hard drive. He was prosecuted for the crime in question and is now serving his sentence. The only safe way to protect your data against a computer forensics team is to set the computer on fire, smash it to bits with a sledgehammer, put it in a container and have it shot into the heart of our sun on a rocket. And even then you can't be sure....

Industrial applications, the insurance industry, legal professionals, the courts and more rely on computer forensics for many functions, ranging from preventing the spread of illegal materials to avoiding corporate fraud. Computer forensics is a growing field, and one that will continue to provide evidence and insight to prevent growing criminal computer related activity.




Are you worried that your computer might be at risk? Your computer security is something you should take very seriously - it only takes one mistake to cause you major problems. If you want more info and help with your computer security problems then click here.




Computer Forensics in Law Enforcement


Computer forensics is a field in demand. Computers have become valuable targets of theft. The information they contain can be stolen or altered for malicious purposes. The need for trained professionals in this field has never been greater.

In law enforcement, computer forensics professionals may work for local police departments, state police departments, or the Federal Bureau of Investigation. They may go to the scene of incidents, gather evidence, investigate the evidence, and write reports. They may also provide testimony for criminal cases in court. Individuals who specialize in the forensic study of computers may also be called "cyber investigators", "cyber cops", or "digital detectives".

Computer forensics experts investigate crimes such as identity theft, credit card fraud, intellectual property theft, threats/harassment, pedophilia, and unauthorized computer system intrusion. These computer crimes or "cyber crimes" constitute a significant risk to individuals, companies, and governments. Cyber crimes result in tens of millions of dollars of dollars in losses each year.

Computer forensics examiners need a wide range of technical skills and knowledge. They must have expertise in network security, protocols, software, computer file formats, routing, cryptology, reverse software engineering, password cracking, and diagnostic techniques. In addition to technical skills, professionals in this field must have good oral and written communication skills, understand and comply with investigation procedures, work under tight deadlines, have problem solving abilities and be creative and persistent in the pursuit of evidence.

Experts in this field may also be involved in crimes that were not directly committed via computer. There may be information stored on a computer or storage device that is important for the case. For example, e-mail evidence can be used in cases against robbery and homicide suspects. Computer forensics experts are needed in these cases, as there are very specific procedures that must be followed for digital information to be presented as valid evidence.




The forensic study of computers can be an interesting, rewarding career. Learn more about this field and computer forensics certification at http://www.computerforensicscertification.net.




Computer Forensics and Legal Aspects


The rate of crimes on internet and networks is increased to an alarming state by hackers, contractors, intruders and employees. Laws are enforced and computer forensics is practiced to avoid and prevent these crimes. Using computer forensics investigators use latest techniques of science and technology to find some evidence against crimes. The evidence will be collected for legal purposes when criminal matters are dealt. Investigation by using latest techniques of science and technology along with computer sciences to collect evidence in criminal and civil courts is called computer forensics. Experts use advanced tools to recover deleted, corrupted or damaged files from hard discs, flash drives and other storage media. A complete examination of windows registry, drives, cookies, deleted files, emails and all other relevant locations is done to find any clue to prosecute the case in law courts.

The first step in collecting evidence is to obtain warrant to search the suspected system. This warrant includes not only seizing and investigating the suspected computer but any devices connected with the crime are also included in it. A printer, scanner or any other device may be used with computer in making crime so these devices are also seized for investigation. Person who examines the computer system is not only an IT expert but a detective. He detects clues to find out the story or details of the crime. The main aim of an investigator or expert is to find out evidence not the culprit. Using computer forensics large amounts of money are recovered by following the law suits in civil and criminal courts.

Computer forensics specialist revealed frauds, crimes and corruptions in insurance companies, criminal prosecutors, large corporations and law enforcement office. The standards, methods and laws of computer forensics are different in different countries. Some evidence is acceptable in some countries but not in others while dealing with crimes at international levels. There is no boundary of internet so it is a problem while investigating and collecting evidences because different countries have different laws.

Personnel, Network administrators and security staff should have knowledge about computer forensics and its legal aspects. An expert should have authority to monitor and collect evidence related to intrusions and computer crimes. The use of security tools should be legal and according to the policies of the company and rules of the country. Computer forensics is a new discipline so the use of existing laws is instable while prosecuting computer crimes. Website of United States Department of Justice's Cyber Crime is the reliable source of information and rules to apply it. Standards of computer forensics and list of recent cases which are in proceeding are given on the website. Evidences are collected in a way which is accepted by the court. Laws are being approved in the favor of personal data security in organizations.

Organizations have to prove that they have applied necessary securities. So when data is theft or affected then there will not be any lawsuit on the company if proper security applications and policies are installed and implemented.

Computer security law has three areas which one should know. First is in United States Constitution; it protects against unreasonable search, attacks and self-incrimination. These were written before problems occurred but tell how to practice them.

In the second area anyone practicing computer forensics should know the effect of three U.S. Statutory laws.

Wiretap Act

Pen Registers and Trap and Trace Devices Statute

Stored Wired and Electronic Communication Act

During the practice of computer forensics violations of any one of the above statutes lead to fine or imprisonment. If a company feels any doubt about that it has committed mistake it should consult with its attorney.

In third area U.S. Federal rules about computer crimes must be understood. There are two areas which affect cyber crimes

1. Authority to collect and monitor data

2. Admissibility of collection methods

If network or system administrators know about the legal and technical complexities of computer forensics or they are able to preserve critical data of the organization then it would be an asset of the organization.




Radha Kishan is currently advertising for a computer forensics provider company whose website is www.cyberevidence.com




Computer Forensics Degree - Requirements and Curriculum


As data security and confidentiality become an increasingly important element of corporate and government communications, the demand for computer forensic scientists is rapidly increasing. In order to enter the field, you should strongly consider enrolling in a program that allows you to earn a bachelor or master computer forensics degree.

Careers in digital forensics requires a broad set of skills to allow you to analyze computer data and security, including network technologies and traffic. Computer forensics degrees allow you to develop a wide range of knowledge in computer science, criminal justice and engineering, all of which is important for a future career in forensics. In particularly, you will develop skills to understand file formats, networking protocols, cryptology, software engineering and data analysis.

Computer forensic degrees are often available as associates or bachelors degrees, as well as through professional, specialist degree training. A number of well known universities such as California State offer degree programs focused on digital forensics. These degrees are structured to enable you to earn become a Certified Information System Security Professional, the highest level of certification for forensics professionals. In addition to in-person training, a number of schools offer online distance training in forensics, including ITT Technical Institute.

Courses within a computer forensics degree generally focus on the technology and legal aspects of the career, requiring the development of a broad base of knowledge. Students are required to gain expertise in the criminal justice and law enforcement system, as well as a core set of skills in both computer science with a focus on hardware and computer security.

At leading universities course offerings include Forensics and Crime Scene Investigation, Cyber Crime Analysis, Police Investigation Techniques, Essentials of Computer Security, Computer Forensic Analysis and Cryptology and Computer Security. Each of these courses builds upon a foundation in criminal justice and computer science. As one of the fastest growing professions, the requirements for computer forensics training require a working knowledge of a range of technology from networking equipment to wireless protocols.

Importantly, leading computer forensics schools will provide you with an opportunity to gain hands on work experience through internships and work study opportunities within the field. Both private companies as well as government agencies are actively recruiting computer forensics experts to aid in investigations, so demand remains high for new entrants into the field. By earning a well qualified computer forensics degree, you can put yourself in a good position to become a working professional upon graduation. Louis Zhang, Accrcomputerforensics dot com




Get more information about computer forensics degree including computer forensics online degrees and training at Accrcomputerforensics dot com.