果冻视频

Skip to Main Content Skip to bottom Skip to Chat, Email, Text

Articles > Information Technology聽>聽What is computer forensics?

What is computer forensics?

Michael Feder

Written by Michael Feder

Kathryn Uhles

Reviewed by聽Kathryn Uhles, MIS, MSP,聽Dean, College of Business and IT

Computer forensics expert examining a computer hard drive

At times during an investigation, law enforcement and examiners might need to access and analyze data, media or other information stored on a computer. Investigators will often turn to experts in聽computer forensics聽鈥斅燼n investigative field of law and computer science聽in which researchers search for, find and preserve forensic evidence.

What is computer forensics used for?

Computer forensics is useful in a wide variety of applications and can be used for both criminal and civil cases.听Sometimes known as computer forensic science, it often starts with data recovery. Investigators who need help securing digital evidence from a laptop, tablet, phone or other connected device may turn to these professionals for forensic support.

For example, it may be used in the following circumstances:

  • Corporate espionage cases. Forensics experts can prove corporate espionage when locating traded documents containing secrets, formulas, recipes, work processes or business plans.
  • NDA disclosure cases. An accidental or intentional breach of a nondisclosure agreement can be proved if the information was disclosed to the public through a traceable piece of technology.
  • Traffic accident testimony.聽Vehicles collect digital evidence on when drivers accelerate and brake. This information can prove valuable in determining fault for a traffic violation.
  • Sexual harassment investigations.聽Messages traced to phones or email addresses can support or refute sexual assault claims.
  • Fraud investigations.聽Advance-fee schemes, Ponzi schemes and other fraudulent strategies often leave behind transaction records, which investigators can use to prove fraud.
  • Murder investigations.聽A killer鈥檚 search history is often used to prove intention during murder investigations.

In some cases, investigators spend more time examining the file鈥檚 data than they do its contents. For example, many images contain information about when, how and where a particular photo was taken. This digital forensics information is often valuable to investigators as supporting evidence during a trial.

Computer forensics vs. cybersecurity

Computer forensics and cybersecurity are two closely related fields. Experts in both of these fields can assist investigators during active investigations, helping to analyze cyber data and providing valuable evidence that helps determine a defendant鈥檚 guilt or innocence.

They focus on a similar goal: protecting digital assets. Both methodologies can be used as effective strategies in virtually any field to ensure forensic data is used only for a particular purpose.

Both fields also include data recovery strategies to help recover forensic data that might have been lost during a security breach, device damage or another issue.

Though similar, these career fields are characterized by a few key differences. While cybersecurity focuses on the prevention of theft, fraud and other kinds of forensic data loss, computer forensics is primarily concerned with data that has already been misused.

Cybersecurity teams work diligently to prevent threats from materializing. For example, they might segment networks, integrate two-factor authentication and require regular password changes to minimize risks. However, sometimes bad actors access protected data without permission.

When data is misused, forensics experts go to work. Using a variety of different data access and recovery strategies, these professionals work to recover forensic data without further harming it. Their findings are useful as evidence in criminal or civil trials, in addition to the value that any recovered data provides.

Jobs in computer forensics

Careers in this field are among the highest-paying computer science jobs in the market today. With the right combination of education and experience, students may be able to pursue a career across a variety of industries. Jobs that may include forensics expertise with computers include:

Computer forensics investigator

Overview: Retrieves sensitive information from devices like computers and phones and helps to preserve evidence. Although the U.S. Bureau of Labor Statistics (BLS) doesn鈥檛 provide salary and related data for this particular profession, the work and salary range of a computer forensics investigator are similar to that of a forensic science technician.

Computer systems analyst

Overview: Analyzes an organization鈥檚 current computer network and determines more effective methods for security and device use.

Education requirements: A聽, usually but not always in computer or information science.

National salary range: As of May 2023, computer systems analsts , with a median wage聽$103,800, according to BLS.

Job outlook: Jobs in this field are projected to grow聽, according to BLS.

The salary ranges are not specific to students or graduates of 果冻视频. Actual outcomes vary based on multiple factors, including prior work experience, geographic location and other factors specific to the individual. 果冻视频 does not guarantee employment, salary level or career advancement. BLS data is geographically based. Information for a specific state/city can be researched on the BLS website.

BLS Occupational Employment Projections, 2022-2032 is published by the U.S. Bureau of Labor Statistics. This data reflects BLS鈥 projections of national (not local) conditions. These data points are not specific to 果冻视频 students or graduates.

Information security analyst

Overview: Proactively assesses and protects an organization鈥檚 software and hardware systems and works to mitigate threats that do arise.

Education requirements: A聽聽or related field is typical, and work experience is desirable.

National salary range: As of May 2023, information security analysts , with a median wage of聽$120,360, according to BLS.

Job outlook: The聽聽from 2022 to 2032, according to BLS.

In addition to the above career choices, there might be opportunities for employment in a role that integrates forensics into other IT tasks. For example, security consultants regularly depend on forensics best practices when searching devices for data.

Alternatively, there might be employment opportunities as a forensic computer analyst, working alongside other analysts on larger investigative projects.

Skills for a career in computer forensics

Whether at a physical crime scene or accessing forensics through files in the device of a person of interest, a specific skill set can help investigators close cases and deliver accurate verdicts. These include:

  • Technical proficiency: Forensics professionals need a deep knowledge of operating systems, hardware and software functionality, and security protocols when searching devices for evidence.
  • Investigative law: An understanding of investigative law is critical for helping determine which types of evidence are permissible in court.
  • Interpersonal communication: The capacity to communicate with investigators, computer experts and fellow computer forensic analysts will be important for meeting project deadlines.
  • Programming: HTML, C++, Python and other coding languages are often useful when accessing data stored on secure hardware.
  • Cybersecurity: Despite the differences between cybersecurity and computer forensics, it's likely important to understand basic cybersecurity and聽IT terminology聽when accessing files and bypassing firewalls.
  • Data analysis: After accessing data files, they need to be analyzed to see which ones are most useful in assisting investigators.
  • Data sensitivity: The ability to comfortably work with sensitive, sometimes disturbing, data is critical.

Education and experience for a career in computer forensics

A career in computer forensics requires an education.听Several different聽technology degrees聽could prepare students for this career. These include:

In addition to education, one or more certificates may be helpful, including:

These brief certificate courses can complement a college education and demonstrate commitment and aptitude to a potential employer.

Contact a 果冻视频 admissions representative for more information.听

Headshot of Michael Feder

ABOUT THE AUTHOR

A graduate of Johns Hopkins University and its Writing Seminars program and winner of the Stephen A. Dixon Literary Prize, Michael Feder brings an eye for detail and a passion for research to every article he writes. His academic and professional background includes experience in marketing, content development, script writing and SEO. Today, he works as a multimedia specialist at 果冻视频 where he covers a variety of topics ranging from healthcare to IT.

Headshot of Kathryn Uhles

ABOUT THE REVIEWER

Currently Dean of the College of Business and Information Technology,聽Kathryn Uhles has served 果冻视频 in a variety of roles since 2006. Prior to joining 果冻视频, Kathryn taught fifth grade to underprivileged youth in Phoenix.

checkmark

This article has been vetted by 果冻视频's editorial advisory committee.听
Read more about our editorial process.

Get your free IT Program Guide

Learn how 100% of our IT degree and certificate programs align with career-relevant skills.

Get your free IT program guide. Please enter your first and last name.

Thank you

Download your pdf guide now. Or access the link in our email.