The Cyber Review: RAID And Digital Forensics | Spotting Cyber Attacks

April 14, 2021
Written by Farah


Redundant Array of Inexpensive Disks (RAID) is used for enhancing the performance of data storage by putting multiple disks into a single array to make the disks work as one to achieve higher speed and reliability which is generally offered by expensive types of disks. RAID has two or more drives that work in parallel. These drives can be hard discs or solid states drives (SSD).

Since they can store a large volume of data, digital forensics investigators can use RAID disks to gather evidence during their investigation. Through the use of different digital forensics tools, computer forensics investigators can acquire the disk image and then evaluate the data storage.

Should You Hire a Computer Forensics Specialist?

The need for computer and digital forensics experts has grown significantly due to new technology and the increase in cyberattacks because of it. Digital forensics skill sets have become a critical element in helping IT security teams learn from security incidents.

Experts say organizations need to have a computer forensics professional on their team because of tighter legal and compliance requirements that have to be fulfilled. Once people understand that a cyberattack will happen, it is just a matter of fact that the digital forensics team will prepare the company for it.

The digital forensics expert can preserve evidence for insurance claims, to document where a defense was ineffective and, by doing so, build up a solid foundation for the proof needed that the company’s defensive and preventive measures were appropriate.

Skill is important but so is a strong understanding of the operating systems, software applications, networking, and hardware.

Companies can work with third-party digital forensics experts too especially because companies might be dealing with different types of security incidents so having a wide range of skill sets from the experts will be beneficial.

Victims are spotting cyber attacks much more quickly - but there's a catch

Cyber criminals are spending less time inside compromised networks, and one reason is because of the surge in ransomware attacks the hackers deploy.

Researchers at FireEye Mandiant looked at hundreds of cyber incidents and found that the "global median dwell time" – the duration between the start of a security intrusion and when it's identified – has dropped to 24 days. Incidents are being identified quicker, whereas last year it was 56 days.

While companies are able to quickly detect attacks inside the network, the decrease is dwell time is also due to the increase in ransomware attacks. So, the best way to protect the organisation from cyber threats is to detect or prevent them before they've even had a chance to compromise the network.