However, this is very old technique but it has been changed a lot due to technological advancement, modern tools and software that make computer forensics much easier for computer Forensics Experts to find and restore more evidence/ data faster and with more accuracy.
Computer forensics has transform the way digital evidence is gathered and used as evidence of a crime and it is done by making use of advanced techniques as well as technologies. A computer forensic expert uses these techniques to discover evidence from an electronic storage device for a possible crime. The data could be from any kind of electronic device such as pen drives, discs, tapes, handhelds, PDAs, memory stick, Emails, logs, hidden or deleted files etc.
Many people think that deleting a file or history will remove it completely from the hard disk drive. In reality, it merely removes the files from the location but the actually files still remains on your computer. It is very easy to track what has been done on your computer system but very difficult to ascertain by whom, however, it is possible to alter or delete the data completely from your storage device. It depends on computer forensic expert’s abilities how well he could locate as well as restore the data without any loss of change.
Computer forensics enjoyed widespread attention during the Enron scandal widely believed to be the biggest computer forensic investigation ever. Nowadays computer forensics and electronic discovery is becoming standard part of litigation of all types, especially large litigation's involving corporate matters in which there are large amounts of data.
It is possible to make use of computer forensics to uncover a fraud, unauthorized use of a computer system, violation of company policies, inadequate record keeping etc . by emails tracking, chat history, files tapes, sites individuals surf or any other form of electronic communications.
Data security is one of the major and biggest challenges that the corporate community is facing now by publishing company’s internet policies and consequences for violations, signing if compliance documents by employees. Business could initiate monitoring their own computer systems to avoid legal consequences in the future. Enabling the awareness of monitoring software and computer forensics personnel could prevent the staff from doing any illegal activities.