Vulnerabilità informatica

In today’s digital world, there is a high risk of unfair competition, industrial espionage, information leaks, data theft, and IT crimes in general.

What is computer forensics?

Computer forensics is the science that studies the identification, storage, protection, recovery, documentation, use, and any other form of IT data processing with a view to examination in legal proceedings.

In Italy, the use of computer forensics results to be produced in court is defined by law no. 48 of 18 March 2008, also known as the “Ratification law of the Budapest Convention”.
In Italy legislation in force calls for:

  • Heavier fines for cyber crime
  • Fines also for companies
  • The possibility for law enforcement agencies to request that the provider suspends internet data for 6 months
  • Greater protection for personal data
  • Stronger laws to combat online child pornography

What may it discover?

By analysing every electronic device with potential data memory, forensic investigation may, for example, discover:

  • Electronic fraud
  • Copyright infringement
  • Infringement of data privacy
  • Infringements regarding content such as child pornography

It is therefore possible to trace all the activity carried out by a user on a Windows, Linux or Apple computer: access times and dates, emails sent, files copied to external drives, programmes and online/offline services used. This makes it possible to trace the entire data flow.

Computer investigation

Computer intelligence activity strategically and globally examines three components:

  • The hardware component, with its technical characteristics and possibilities offered by the devices;
  • Software components, namely the programmes, operating systems and configurations;
  • The human component, often underestimated in terms of activities and procedures, which are often the weakest link of the entire infrastructure.

Effective intervention to reduce potential problems is possible, with the adoption of technological measures that protect the company’s privacy and assets, helping to prevent any hacking attempts and identifying those responsible for the attack and transmission of data, fake news or defamatory information.

 

Translation from the Italian website—all references are to Italian legislation