SlideShare a Scribd company logo
1 of 3
Hankins 1


Mary Hankins


Mr. Habib


Business 102


14 March 2008


                                                  Computer Forensics Specialist


            Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field

that involves gathering and analyzing evidence from computers and networks. Because the computers and internet are the

fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to

come.


            A computer forensics specialist examines computer media, programs, data, and log files on computers, servers,

and networks. According to Shelly and Cash man (Computer Careers), many areas employ computer forensics specialist,

including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security

departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience of

much type of hardware and software products, superior communication skills, a willingness to learn and update skills, and

a knack for problem solving.


            When a problem occurs, is the responsibility of the computer or forensics specialist to carefully take several

steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the

suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted

files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58)
Hankins 2


         A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system

to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught

computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer

Science should be supplemented with graduate courses and university-level professional development certificates. Entry

level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-

55)


         With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise.

As a result, the needed for skilled specialist to battle these crimes will increase for many years to come.




                                                        Works cited
Hankins 3


Reinman, David P. “Fighting Cydercriminals.” Cybertech Monthly February 2008: 52-28.

Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008

        www.scsite.com/wd2007/pr2/wc.htm.

Turell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing

        Company, 2008.

More Related Content

What's hot

Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neriaejay_neri
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)lord_durana
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipnerikent neri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neriaejay_neri
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 

What's hot (20)

Jenevie
JenevieJenevie
Jenevie
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Viewers also liked

Viewers also liked (8)

Arriben els patges a l’escola
Arriben els patges a l’escolaArriben els patges a l’escola
Arriben els patges a l’escola
 
Impressora | Série F - Comercial
Impressora | Série F - ComercialImpressora | Série F - Comercial
Impressora | Série F - Comercial
 
How to shows_our_kindness__1__2_[1]....
How to shows_our_kindness__1__2_[1]....How to shows_our_kindness__1__2_[1]....
How to shows_our_kindness__1__2_[1]....
 
Attitude
AttitudeAttitude
Attitude
 
Can treo dien tu
Can treo dien tuCan treo dien tu
Can treo dien tu
 
poèmes
poèmespoèmes
poèmes
 
Itil quality management
Itil quality managementItil quality management
Itil quality management
 
Verpleegkundig Jaarboek 2010-2014
Verpleegkundig Jaarboek 2010-2014Verpleegkundig Jaarboek 2010-2014
Verpleegkundig Jaarboek 2010-2014
 

Similar to (kevin 09) chap.2 lab 1 kvin(1)

Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx
94 C o M M u N i C at i o N s o f t H e a C M j A.docxevonnehoggarth79783
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 

Similar to (kevin 09) chap.2 lab 1 kvin(1) (13)

Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Forensics
ForensicsForensics
Forensics
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 

Recently uploaded

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

(kevin 09) chap.2 lab 1 kvin(1)

  • 1. Hankins 1 Mary Hankins Mr. Habib Business 102 14 March 2008 Computer Forensics Specialist Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because the computers and internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cash man (Computer Careers), many areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience of much type of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, is the responsibility of the computer or forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58)
  • 2. Hankins 2 A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44- 55) With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the needed for skilled specialist to battle these crimes will increase for many years to come. Works cited
  • 3. Hankins 3 Reinman, David P. “Fighting Cydercriminals.” Cybertech Monthly February 2008: 52-28. Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008 www.scsite.com/wd2007/pr2/wc.htm. Turell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company, 2008.