We are independent & ad-supported. We may earn a commission for purchases made through our links.

Advertiser Disclosure

Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.

How We Make Money

We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently from our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What Is the Connection between Computer Security and Forensics?

By Eugene P.
Updated May 17, 2024
Our promise to you
WiseGEEK is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At WiseGEEK, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

Computer security and forensics are connected because they can complement each other. A computer network that implements security procedures and protocols with the awareness that the information could be tampered with, stolen or otherwise compromised can follow guidelines that will help a computer forensics investigator retrieve reliable information that could be used for legal prosecution of the intruder. In the same way, a computer forensics investigator who has a working knowledge of computer security will be able to better assess a system that is using defensive programs in an attempt to block access or hide information. Both computer security and forensics involve protecting data, access logs, hardware and other elements of a computer system or network and, when used in tandem and playing on common concepts, they can help create a system that is difficult to hack into and nearly impossible to manipulate invisibly.

Certain aspects of computer security can be used in digital forensics. Suspected computer systems that are used by inexperienced or only moderately experienced users could be employing simple, standard protective software that is built into the operating system or that is commercially available. A familiarity with these systems and how they work can reduce the amount of time it takes to gain access to a system and also help to narrow the areas of a search for information on a hard drive or other device. Knowledge of how network security systems such as firewalls and proxy servers operate can enable an investigator to draw out information, such as browsing habits or failed network connections, which otherwise might have taken a much longer time to find.

Similarly, there are techniques used in digital forensics that can help to protect data inside a computer system or network while also laying a foundation that could assist an investigator attempting to find evidence to prosecute an intruder. Administrators can save disk images of hard drives for employees instead of simply backing up information. Local hard drives can be eliminated completely, forcing computers to access a central networked drive that can be tightly controlled and made tamper-resistant, providing a clean forensic environment. Extensive log files could be kept, detailing the actions of users during the course of a day. Another tactic that could be employed is to take physical backups of the data in the system and have a verified and secure storage location so the time and dates of information can be validated if a legal proceeding is needed.

The most important connection between computer security and forensics is that, ultimately, both fields share some common goals. Both seek to secure a system in a way that preserves data, prevents and tracks unauthorized access and hidden files or actions, and stops future illegal activities on the computer system. The two fields are slowly moving closer to one another, as evidenced by the appearance of computer security and forensics training courses that combine the two disciplines.

WiseGEEK is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Discussion Comments

WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.