-
Forensic computing is an investigative tool used to analyze digital data and media to determine if it contains any useful information that can aid in solving a crime.
Access
Investigators need to have permission to access the digital data or media. This requires permission from the owner or securing a search warrant to gain access.
Acquire
The computer forensic investigator acquires the data by making a forensic copy or mirror image of it. This allows access to the data without corrupting the original information.
Analyze
All the digital data has to be analyzed to see if there is any data that offers a lead or corroborating evidence that will aid in the investigation.
Report
The computer forensic specialist will need to take notes and write an official report on the findings to share with the lead investigator or prosecutor. She may also be called to testify in a trial about the findings
Considerations
Forensic computing is often a time-consuming process. There may be a huge amount of data to sift through, and only a small amount of data that will help in the investigation.
Source:
Cyber Security Institute, "What is Computer Forensics?"
International Journal of Digital Evidence, "Computer Forensic Analysis in a Virtual Environment"
Copyright 2023, Wired Ivy, LLC