SlideShare une entreprise Scribd logo
1  sur  3
Hankins 1


        Mary Hankins

        Mr. Habib

        Business 102

        14 March 2008

                                       Computer Forensics Specialist

      Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly

growing field that involves gathering and analyzing evidence from computers and networks. Because

computers and the Internet are the fastest growing technology used for criminal activity, the need for

computer forensics specialist will increase in years to come.


      A computer forensics specialist examines computer media, programs, data, and log files on

computers, servers, and networks. According to Shelly and Cashman (Shelly)many areas employ

computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence,

insurance agencies, and information security departments in the private sector. A computer forensics

specialist must have knowledge of the law, technical experience with many types of hardware and

software products, superior communications skills, a willingness to learn and update skills, and a knack

for problem solving.


      When a problem occurs, it is the responsibility of the computer forensics specialist to carefully

take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer .

These steps include protecting the suspect’s computer, discovering all files, recovering deleted files,

revealing hidden files, accesing protected or encrypted files, analyzing all the data, and providing expert

consultation and/or testimony as required (Reinman 52-58).


      A computer forensics specialist must have knowledge of all aspects of the computer, from the
operating system to computer architecture and hardware design. In the past, many computer forensics
specialist were self-taught compter users. Today, extensive training, usually from several different
Hankins 2


      Sources, is required. A degree in Computer Science should be supplemented with graduate

courses and university-level professional development certificates. Entry level salaries range from

$45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55).


      With the growing use of computers in all areas of life, the number of computer crimes surely will

continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many

years to come.
Hankins 3


                                     Works Cited
Reinman, David p. "Fighting Cybercriminals." Cybertech Monthly 7 February 2008: 52-58.

Shelly, Gary b., and Thomas J. Cashman. Computer Careers. 7 March 2008.
<<www.scsite.com/wd2007/pr2/wc.htm>.>.

Turell, Marcia O, and Alex N. Gutierrez. "Cybercrimes and Criminals."El Paso: Legal Works
Publishing Company (2008): 44-55.

Contenu connexe

Tendances

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
Arber Hoxhallari
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
Omid Aminzadeh Gohari
 

Tendances (20)

Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Lab 1
Lab 1Lab 1
Lab 1
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Data Security
Data SecurityData Security
Data Security
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 

En vedette

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)
kent neri
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)
kent neri
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)
kent neri
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2
mehhhh
 

En vedette (7)

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similaire à Kent philipneri

Similaire à Kent philipneri (20)

Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Jenevie
JenevieJenevie
Jenevie
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Hankins (merjo)
Hankins (merjo)Hankins (merjo)
Hankins (merjo)
 

Plus de kent neri

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1
kent neri
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)
kent neri
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )
kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
kent neri
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)
kent neri
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)
kent neri
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
kent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
kent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
kent neri
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
kent neri
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
kent neri
 

Plus de kent neri (18)

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)
 
Craft barn
Craft barnCraft barn
Craft barn
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Play ball
Play ballPlay ball
Play ball
 
Play ball
Play ballPlay ball
Play ball
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Kent philipneri

  • 1. Hankins 1 Mary Hankins Mr. Habib Business 102 14 March 2008  Computer Forensics Specialist Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialist will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cashman (Shelly)many areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer . These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accesing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58). A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialist were self-taught compter users. Today, extensive training, usually from several different
  • 2. Hankins 2 Sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55). With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.
  • 3. Hankins 3 Works Cited Reinman, David p. "Fighting Cybercriminals." Cybertech Monthly 7 February 2008: 52-58. Shelly, Gary b., and Thomas J. Cashman. Computer Careers. 7 March 2008. <<www.scsite.com/wd2007/pr2/wc.htm>.>. Turell, Marcia O, and Alex N. Gutierrez. "Cybercrimes and Criminals."El Paso: Legal Works Publishing Company (2008): 44-55.