Data Recovery Techniques

             According to a leading provider of the service, computer security forensics uses the discovery of computer-related evidence and data, including but not limited to computer data recovery techniques and tools, the gathering of formal computer evidence processing protocols and other findings to identify the "leakage" of classified information on computer storage devices, and compiles computer data to track criminal activity conducted with computer technology. In short, computer forensics is a way to use computers to gathering evidence about crimes that use computers as a 'tool' of criminal activities. ("NIT: About Us," 2005) .

             These crimes may be computer-related, such as spreading viruses throughout the organization, or 'real life' crimes that partially used computers. Regardless, any organization that deals regularly with the public in an online format must be concerned about computer related crimes such as identity theft, and must at least consider using computer forensics in part of its arsenal of protective services for its employees and customers. For example, in the banking industry, "The rate at which smaller financial institutions are being phished is increasing substantially, as are the techniques being used by phishers." (Eazel, 2005) .

             Now phishers/hackers are using more sophisticated techniques "such as botnets and dynamic DNS to host the phishing sites. Using these techniques, "phishers can target dozens of small financial institutions at one time and send out thousands of malicious emails simultaneously." (Eazel, 2005) Computer forensics experts can trace the desktops used in these devices to trace what accounts have been compromised and how these are being used to send out the phishing emails. The problem with phishing and identity theft is not endemic to one industry, however-rather it is pervasive to virtually any business that deploys credit cards and conducts commerce over the World Wide Web.

Related Essays: