Read 34 401 - jserpa-p/lisbon-ops-301n1_Reading GitHub Wiki

Forensics Investigation with Autopsy

Computer forensics is a field of investigation that focuses on analyzing digital evidence found on computers and other devices. It involves collecting and examining data to uncover information that can be used in legal cases or investigations. This process includes recovering deleted files, studying network activity, and analyzing malicious software. Computer forensics experts also provide their findings in court as expert witnesses.

Computer forensics vs cybersecurity

Cybersecurity is focused on prevention while computer forensics is more reactionary in nature. Cybersecurity experts work to keep hackers out, while computer forensics experts focus on how to move forward once a hacker has gotten in. These two fields work directly together in keeping cyber criminals at bay.

Questions

What are the main differences between computer forensics and cybersecurity?

The main difference is that cybersecurity is preventive and computer forensics is reactive, that means that cybersecurity works to keep hackers out the system and computer forensics works to move out hackers once their in the system. Cybersecurity builds a security system to keep data and information secure. Computer forensics finds how the breach happened and works to recover the data.

What are the six stages of a computer forensics examination?

  1. Identify: Determine the purpose and scope of the investigation.

  2. Preserve: Safeguard the digital evidence to maintain its integrity.

  3. Collect: Gather the relevant data from computers and devices.

  4. Examine: Analyze the collected evidence using specialized tools.

  5. Analyze: Interpret the findings and identify connections or patterns.

  6. Report: Document the results in a clear and comprehensive report for legal purposes.