Your SlideShare is downloading. ×
Mjtanasas2
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Mjtanasas2

740

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
740
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Hankins 1 Mary Hankins Mr. Habib Business 102 14 March 2008  Computer Forensics Specialist Computer forensics, also called digital forensics, network forensics, or cyber forensics, is arapidly growing field that involves gathering and analyzing evidence from computers andnetworks. Because computers and the Internet are the fastest growing technology used forcriminal activity, the need for computer forensics specialist will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log fileson computers, servers, and networks. According to Shelly and Cashman (Shelly)many areasemploy computer forensics specialist, including law enforcement, criminal prosecutors, militaryintelligence, insurance agencies, and information security departments in the private sector. Acomputer forensics specialist must have knowledge of the law, technical experience with manytypes of hardware and software products, superior communications skills, a willingness to learnand update skills, and a knack for problem solving. When a problem occurs, it is the responsibility of the computer forensics specialist tocarefully take several steps to identify and retrieve possible evidence that may exist on asuspect’s computer . These steps include protecting the suspect’s computer, discovering allfiles, recovering deleted files, revealing hidden files, accesing protected or encrypted files,analyzing all the data, and providing expert consultation and/or testimony as required (Reinman52-58). A computer forensics specialist must have knowledge of all aspects of the computer, fromthe operating system to computer architecture and hardware design. In the past, many
  • 2. Hankins 2computer forensics specialist were self-taught compter users. Today, extensive training, usuallyfrom several different Sources, is required. A degree in Computer Science should be supplemented withgraduate courses and university-level professional development certificates. Entry level salariesrange from $45,000 to $75,000. With experience and certifications, salaries can exceed$125,000 (Turell 44-55). With the growing use of computers in all areas of life, the number of computer crimessurely will continue to rise. As a result, the need for skilled specialists to battle these crimes willincrease for many years to come.
  • 3. Hankins 3 Works CitedReinman, David p. "Fighting Cybercriminals." Cybertech Monthly 7 February 2008: 52-58.Shelly, Gary b., and Thomas J. Cashman. Computer Careers. 7 March 2008.<<www.scsite.com/wd2007/pr2/wc.htm>.>.Turell, Marcia O, and Alex N. Gutierrez. "Cybercrimes and Criminals."El Paso: LegalWorks Publishing Company (2008): 44-55.

×