• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Chapter 2   lab 1 --- gladys arianne ybañez
 

Chapter 2 lab 1 --- gladys arianne ybañez

on

  • 387 views

 

Statistics

Views

Total Views
387
Views on SlideShare
387
Embed Views
0

Actions

Likes
1
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Chapter 2   lab 1 --- gladys arianne ybañez Chapter 2 lab 1 --- gladys arianne ybañez Document Transcript

    • Mary Hankins <br />Mr. Habib <br />Business 102 <br />14 March 2008<br />Computer Forensics Specialist <br />Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because the computers and internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come. <br />A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cash man (Computer Careers), many areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience of much type of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving.<br />When a problem occurs, is the responsibility of the computer or forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58) <br />A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55)<br />With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the needed for skilled specialist to battle these crimes will increase for many years to come. <br />Works cited <br />Reinman, David P. “Fighting Cydercriminals.” Cybertech Monthly February 2008: 52-28. <br />Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008<br />www.scsite.com/wd2007/pr2/wc.htm.<br />Turell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing <br />Company, 2008. <br />