Computer sleuth - the inside job

Wednesday, 29 January 2003, 11:43 AM EST

The chilled room and thin rubber gloves clutching what could be a surgical instrument hint at a more medical version of forensics. But the corpse being dissected in the air-conditioned forensics lab at financial intelligence specialists McCallum Petterson is a laptop - and its exposed innards are potentially a mine of damning evidence.

In our digital work environment, a company or employee indulging in illegal or immoral activity is likely to have left a few electronic footprints. And it's a trail not easily erased.

Deleting computer files only removes them from view, says company IT forensics specialist Daniel Ayers, it doesn't destroy them.

"If you analyse the hard disc, you can retrieve deleted files dating back years. Most people don't know that. They don't realise they are leaving tracks."

Computers, cellphones, global positioning systems or other electronic devices all have their stories to tell when interrogated by an IT forensics expert.

[ Read more ]

Related items




Spotlight

Behavioral analysis and information security

Posted on 22 September 2014.  |  In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security and how behavioral analysis can influence the evolution of security technologies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //