SlideShare a Scribd company logo
1 of 2
Mary Hankins <br />Mr. Habbib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity. The need for computer forensics specialist will increase in years to come.<br />      A Computer forensics specialist examines computer  media, programs, data, and log files on computers, servers, and networks, According the Shelly and Cash man (Computer Careers,) many areas employ computer forensics specialist, including law enforcement, criminal processors, military Intelligence, insurance agencies, and information security departments in the private sector. A Computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, and willingness to learn and update skills, and a knack for problem solving.<br />       When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to indentify and receive possible evidence that may exists on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data. And providing expert consultation and/or testimony as required (Rein man 52-58).<br />       A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialist were self-taught computer users. Today, extensive training from several different<br />
Sabate chap2 lab1

More Related Content

What's hot

Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neriaejay_neri
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)lord_durana
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1maranan_alexa
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)jeremargwapo
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2guest4ea1460
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecastj9lai
 

What's hot (20)

Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Lab 1
Lab 1Lab 1
Lab 1
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Acc 626 slidecast
Acc 626 slidecastAcc 626 slidecast
Acc 626 slidecast
 

Similar to Sabate chap2 lab1

Kent philipneri
Kent philipneriKent philipneri
Kent philipnerikent neri
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 

Similar to Sabate chap2 lab1 (13)

Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Forensics
ForensicsForensics
Forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 

More from }{it -Boy

Sabate chap2 lab2
Sabate chap2 lab2Sabate chap2 lab2
Sabate chap2 lab2}{it -Boy
 
Sabate lab 1 chap3
Sabate lab 1 chap3Sabate lab 1 chap3
Sabate lab 1 chap3}{it -Boy
 
Sabate chap1 lab2
Sabate chap1 lab2Sabate chap1 lab2
Sabate chap1 lab2}{it -Boy
 
Working togther
Working togtherWorking togther
Working togther}{it -Boy
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot}{it -Boy
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot}{it -Boy
 

More from }{it -Boy (10)

Sabate chap2 lab2
Sabate chap2 lab2Sabate chap2 lab2
Sabate chap2 lab2
 
Sabate lab 1 chap3
Sabate lab 1 chap3Sabate lab 1 chap3
Sabate lab 1 chap3
 
Sabate chap1 lab2
Sabate chap1 lab2Sabate chap1 lab2
Sabate chap1 lab2
 
Advertises
AdvertisesAdvertises
Advertises
 
Advertises
AdvertisesAdvertises
Advertises
 
Advertises
AdvertisesAdvertises
Advertises
 
Advertises
AdvertisesAdvertises
Advertises
 
Working togther
Working togtherWorking togther
Working togther
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 

Sabate chap2 lab1

  • 1. Mary Hankins <br />Mr. Habbib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity. The need for computer forensics specialist will increase in years to come.<br /> A Computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks, According the Shelly and Cash man (Computer Careers,) many areas employ computer forensics specialist, including law enforcement, criminal processors, military Intelligence, insurance agencies, and information security departments in the private sector. A Computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, and willingness to learn and update skills, and a knack for problem solving.<br /> When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to indentify and receive possible evidence that may exists on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data. And providing expert consultation and/or testimony as required (Rein man 52-58).<br /> A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialist were self-taught computer users. Today, extensive training from several different<br />