SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />               Computer forensics also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.<br />              A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to (Shelly and Cashman)(Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. Computer forensics specialists must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and updates skills, and a knack for problem solving.<br />              When a problem occurs, it is the responsibility of the computer forensics specialists to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and /or testimony as required (Reinman 52-58)<br />              A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry-level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell and Gutierrez 44-45)<br />              With the growing use of computers in all areas of life, the number of computer crime surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited BIBLIOGRAPHY Reinman, David P. quot;
Fighting Cybercriminals.quot;
 Cybertech Monthly February 2008: 52-58.Shelly, Gary B. and Thomas J. Cashman. quot;
Computer Careers.quot;
 Course Technology 7 March 2008:  <www.scsite.com/wd2007/pr2/wc.htm>.Turell, Marcia O. and Alex N. Gutierrez. Cybercrimes and Criminals El Paso: Legal Works Publishing Company 2008: 44-45.<br />
Computer Forensics Specialist
Computer Forensics Specialist

Weitere ähnliche Inhalte

Was ist angesagt? (18)

Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Lab 1
Lab 1Lab 1
Lab 1
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 

Ähnlich wie Computer Forensics Specialist

Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
kent neri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
kent neri
 

Ähnlich wie Computer Forensics Specialist (14)

Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Forensics
ForensicsForensics
Forensics
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Cyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdfCyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdf
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
 
cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..cyber forensic courses in kerala,kochi..
cyber forensic courses in kerala,kochi..
 

Mehr von Guevarra Institute of Technology

Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Guevarra Institute of Technology
 
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
Guevarra Institute of Technology
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
Guevarra Institute of Technology
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
Guevarra Institute of Technology
 

Mehr von Guevarra Institute of Technology (20)

Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)
 
Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)
 
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
 
Lucagbo.... Chap2-Case3 Fund Raising
Lucagbo.... Chap2-Case3 Fund RaisingLucagbo.... Chap2-Case3 Fund Raising
Lucagbo.... Chap2-Case3 Fund Raising
 
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
 
Lucagbo Chap2-Case1 Doze-Now
Lucagbo Chap2-Case1 Doze-NowLucagbo Chap2-Case1 Doze-Now
Lucagbo Chap2-Case1 Doze-Now
 
Lucagbo Chap1-Case 2 Quarterly Environmental Friendly
Lucagbo Chap1-Case 2 Quarterly Environmental FriendlyLucagbo Chap1-Case 2 Quarterly Environmental Friendly
Lucagbo Chap1-Case 2 Quarterly Environmental Friendly
 
Qnx
QnxQnx
Qnx
 
QNX OS
QNX OSQNX OS
QNX OS
 
Lucagbo sheet1
Lucagbo sheet1Lucagbo sheet1
Lucagbo sheet1
 
Lucagbo sheet1 (1)
Lucagbo sheet1 (1)Lucagbo sheet1 (1)
Lucagbo sheet1 (1)
 
Lucagbo sheet1 (3)
Lucagbo sheet1 (3)Lucagbo sheet1 (3)
Lucagbo sheet1 (3)
 
Lucagbo sheet1 (2)
Lucagbo sheet1 (2)Lucagbo sheet1 (2)
Lucagbo sheet1 (2)
 
Chap2 lab2 jackson's bright ideas sheet1
Chap2 lab2 jackson's bright ideas sheet1Chap2 lab2 jackson's bright ideas sheet1
Chap2 lab2 jackson's bright ideas sheet1
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
 
Six sigma...by raziel lucagbo
Six sigma...by raziel lucagboSix sigma...by raziel lucagbo
Six sigma...by raziel lucagbo
 
Android...by raziel lucagbo
Android...by raziel lucagboAndroid...by raziel lucagbo
Android...by raziel lucagbo
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
 
Lucagbo 1 sheet1
Lucagbo 1 sheet1Lucagbo 1 sheet1
Lucagbo 1 sheet1
 
Lucagbo 1 sheet1
Lucagbo 1 sheet1Lucagbo 1 sheet1
Lucagbo 1 sheet1
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Computer Forensics Specialist

  • 1. Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br /> Computer forensics also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.<br /> A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to (Shelly and Cashman)(Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. Computer forensics specialists must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and updates skills, and a knack for problem solving.<br /> When a problem occurs, it is the responsibility of the computer forensics specialists to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and /or testimony as required (Reinman 52-58)<br /> A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry-level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell and Gutierrez 44-45)<br /> With the growing use of computers in all areas of life, the number of computer crime surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited BIBLIOGRAPHY Reinman, David P. quot; Fighting Cybercriminals.quot; Cybertech Monthly February 2008: 52-58.Shelly, Gary B. and Thomas J. Cashman. quot; Computer Careers.quot; Course Technology 7 March 2008: <www.scsite.com/wd2007/pr2/wc.htm>.Turell, Marcia O. and Alex N. Gutierrez. Cybercrimes and Criminals El Paso: Legal Works Publishing Company 2008: 44-45.<br />