SlideShare une entreprise Scribd logo
1  sur  3
Hankins 1


        Mary Hankins

        Mr. Habib

        Business 102

        14 March 2008

                                       Computer Forensics Specialist

      Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly

growing field that involves gathering and analyzing evidence from computers and networks. Because

computers and the Internet are the fastest growing technology used for criminal activity, the need for

computer forensics specialist will increase in years to come.


      A computer forensics specialist examines computer media, programs, data, and log files on

computers, servers, and networks. According to Shelly and Cashman (Shelly)many areas employ

computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence,

insurance agencies, and information security departments in the private sector. A computer forensics

specialist must have knowledge of the law, technical experience with many types of hardware and

software products, superior communications skills, a willingness to learn and update skills, and a knack

for problem solving.


      When a problem occurs, it is the responsibility of the computer forensics specialist to carefully

take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer .

These steps include protecting the suspect’s computer, discovering all files, recovering deleted files,

revealing hidden files, accesing protected or encrypted files, analyzing all the data, and providing expert

consultation and/or testimony as required (Reinman 52-58).


      A computer forensics specialist must have knowledge of all aspects of the computer, from the
operating system to computer architecture and hardware design. In the past, many computer forensics
specialist were self-taught compter users. Today, extensive training, usually from several different
Hankins 2


      Sources, is required. A degree in Computer Science should be supplemented with graduate

courses and university-level professional development certificates. Entry level salaries range from

$45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55).


      With the growing use of computers in all areas of life, the number of computer crimes surely will

continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many

years to come.
Hankins 3


                                     Works Cited
Reinman, David p. "Fighting Cybercriminals." Cybertech Monthly 7 February 2008: 52-58.

Shelly, Gary b., and Thomas J. Cashman. Computer Careers. 7 March 2008.
<<www.scsite.com/wd2007/pr2/wc.htm>.>.

Turell, Marcia O, and Alex N. Gutierrez. "Cybercrimes and Criminals."El Paso: Legal Works
Publishing Company (2008): 44-55.

Contenu connexe

Tendances

Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)Masudur Rahman
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsSukanya Ben
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital FirmMohamad Fathi
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systemsOmid Aminzadeh Gohari
 

Tendances (20)

Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Lab 1
Lab 1Lab 1
Lab 1
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Data Security
Data SecurityData Security
Data Security
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 

En vedette

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)kent neri
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)kent neri
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)kent neri
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2mehhhh
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakShelly Sanchez Terrell
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

En vedette (7)

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similaire à Kent philipneri

Similaire à Kent philipneri (20)

Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Jenevie
JenevieJenevie
Jenevie
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Hankins (merjo)
Hankins (merjo)Hankins (merjo)
Hankins (merjo)
 

Plus de kent neri

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1kent neri
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)kent neri
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)kent neri
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)kent neri
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)kent neri
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lotkent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)kent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)kent neri
 
Airplane rides
Airplane ridesAirplane rides
Airplane rideskent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)kent neri
 
Autumn festival
Autumn festivalAutumn festival
Autumn festivalkent neri
 

Plus de kent neri (18)

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)
 
Craft barn
Craft barnCraft barn
Craft barn
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Play ball
Play ballPlay ball
Play ball
 
Play ball
Play ballPlay ball
Play ball
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Dernier

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Dernier (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Kent philipneri

  • 1. Hankins 1 Mary Hankins Mr. Habib Business 102 14 March 2008  Computer Forensics Specialist Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialist will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cashman (Shelly)many areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer . These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accesing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58). A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialist were self-taught compter users. Today, extensive training, usually from several different
  • 2. Hankins 2 Sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55). With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.
  • 3. Hankins 3 Works Cited Reinman, David p. "Fighting Cybercriminals." Cybertech Monthly 7 February 2008: 52-58. Shelly, Gary b., and Thomas J. Cashman. Computer Careers. 7 March 2008. <<www.scsite.com/wd2007/pr2/wc.htm>.>. Turell, Marcia O, and Alex N. Gutierrez. "Cybercrimes and Criminals."El Paso: Legal Works Publishing Company (2008): 44-55.