View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. What Is
June 17, 2016updated 21 Oct 2016 4:40pm

What is computer forensics?

Computer forensics is rapidly evolving

By Sam

Computer forensics is the process of investigation to identify cybersecurity breaches and data stealing. It is also known as electronic discovery.

Forensics began as a post event discipline.

Experts examine systems following successful attacks and breaches and perform the clean-up and recommend mitigation actions.

IP theft is a growing threat. Anyone with data which has a value to someone is a potential target.

Expect a huge demand for computer forensics experts in the future.

The skills required include:
– Computer forensic security
– Forensic digital evidence
– Advanced digital investigation techniques
– Information engineering
– Computer systems and network technologies
– Mathematics and statistics for computing
– Procedural programming
– Computer programming
– Computer systems security
– Cryptography and information assurance
– Software development
– Advanced legal, social, ethical and professional issues
– Computers and the law

(picture courtesy of computersciencelabs.com

Content from our partners
Green for go: Transforming trade in the UK
Manufacturers are switching to personalised customer experience amid fierce competition
How many ends in end-to-end service orchestration?

The BA Hons course in South Wales University which offer the above says of Computer Forensics.

"Data stored on digital devices reveals what we do and where we have been. Authorities can use this information to identify and convict people who break the law. This means that skilled professionals who can gather and interpret digital data are in high demand, and this practical course produces such professionals."

"Study the computer forensic process, tools and procedures, computer forensic and digital evidence, criminology, cryptography, information security, and computer crime. By graduation, you’ll be able to manage a forensic case and perform technical analysis of computer-based evidence."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU