SlideShare a Scribd company logo
1 of 3
Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />COMPUTER FORENSICS SPECIALIST<br />               Computer forensics also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.<br />              A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to (Shelly and Cashman)(Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialists must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and updates skills, and a knack for problem solving.<br />              When a problem occurs, it is the responsibility of the computer forensics specialists to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and /or testimony as required (Reinman 52-58)<br />              A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry-level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell and Gutierrez 44-45)<br />              With the growing use of computers in all areas of life, the number of computer crime surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited BIBLIOGRAPHY Reinman, David P. quot;
Fighting Cybercriminals.quot;
 Cybertech Monthly February 2008: 52-58.Shelly, Gary B. and Thomas J. Cashman. quot;
Computer Careers.quot;
 Course Technology 7 March 2008:  <www.scsite.com/wd2007/pr2/wc.htm>.Turell, Marcia O. and Alex N. Gutierrez. Cybercrimes and Criminals El Paso: Legal Works Publishing Company 2008: 44-45.<br />
Computer forensics paper
Computer forensics paper

More Related Content

What's hot

Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)lord_durana
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1maranan_alexa
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)jeremargwapo
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2guest4ea1460
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Filesamiable_indian
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 

What's hot (18)

Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Lab 1
Lab 1Lab 1
Lab 1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 

Viewers also liked (14)

Australian economy and printing industry market conditions
Australian economy and printing industry market conditionsAustralian economy and printing industry market conditions
Australian economy and printing industry market conditions
 
Fan value of renren nielsen 精简版
Fan value of renren  nielsen  精简版Fan value of renren  nielsen  精简版
Fan value of renren nielsen 精简版
 
Slider presentation
Slider presentationSlider presentation
Slider presentation
 
Maestria 3 y 4 capitulos
Maestria 3 y 4 capitulosMaestria 3 y 4 capitulos
Maestria 3 y 4 capitulos
 
federal reserve.
federal reserve.federal reserve.
federal reserve.
 
BLOC 2: LA INTERIORITAT
BLOC 2: LA INTERIORITATBLOC 2: LA INTERIORITAT
BLOC 2: LA INTERIORITAT
 
J.andres
J.andresJ.andres
J.andres
 
Checklist Minder Hinder-plan
Checklist Minder Hinder-planChecklist Minder Hinder-plan
Checklist Minder Hinder-plan
 
Getting started with R
Getting started with RGetting started with R
Getting started with R
 
Lesson 7 diet and energy balance
Lesson 7   diet and energy balanceLesson 7   diet and energy balance
Lesson 7 diet and energy balance
 
Campus Mentis - Milano
Campus Mentis - MilanoCampus Mentis - Milano
Campus Mentis - Milano
 
Save the Children's flood relief response in Odisha 2011
Save the Children's flood relief response in Odisha 2011Save the Children's flood relief response in Odisha 2011
Save the Children's flood relief response in Odisha 2011
 
Reach FolderA4
Reach FolderA4Reach FolderA4
Reach FolderA4
 
Sin eng-21 - activities for family
Sin eng-21 - activities for familySin eng-21 - activities for family
Sin eng-21 - activities for family
 

Similar to Computer forensics paper

Kent philipneri
Kent philipneriKent philipneri
Kent philipnerikent neri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Cetpa Infotech
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 

Similar to Computer forensics paper (14)

Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Forensics
ForensicsForensics
Forensics
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 

More from Guevarra Institute of Technology

Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1Guevarra Institute of Technology
 
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1Guevarra Institute of Technology
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1Guevarra Institute of Technology
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1Guevarra Institute of Technology
 

More from Guevarra Institute of Technology (20)

Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)
 
Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)Lucagbo.... chap2 case1 weight-loss (1)
Lucagbo.... chap2 case1 weight-loss (1)
 
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
Lucagbo...Chap2 lab3 benson yackley equities online-1 sheet1
 
Lucagbo.... Chap2-Case3 Fund Raising
Lucagbo.... Chap2-Case3 Fund RaisingLucagbo.... Chap2-Case3 Fund Raising
Lucagbo.... Chap2-Case3 Fund Raising
 
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
(Lucagbo) Chap1-lab2 Scissors office supply annual sales sheet1
 
Lucagbo Chap2-Case1 Doze-Now
Lucagbo Chap2-Case1 Doze-NowLucagbo Chap2-Case1 Doze-Now
Lucagbo Chap2-Case1 Doze-Now
 
Lucagbo Chap1-Case 2 Quarterly Environmental Friendly
Lucagbo Chap1-Case 2 Quarterly Environmental FriendlyLucagbo Chap1-Case 2 Quarterly Environmental Friendly
Lucagbo Chap1-Case 2 Quarterly Environmental Friendly
 
Qnx
QnxQnx
Qnx
 
QNX OS
QNX OSQNX OS
QNX OS
 
Lucagbo sheet1
Lucagbo sheet1Lucagbo sheet1
Lucagbo sheet1
 
Lucagbo sheet1 (1)
Lucagbo sheet1 (1)Lucagbo sheet1 (1)
Lucagbo sheet1 (1)
 
Lucagbo sheet1 (3)
Lucagbo sheet1 (3)Lucagbo sheet1 (3)
Lucagbo sheet1 (3)
 
Lucagbo sheet1 (2)
Lucagbo sheet1 (2)Lucagbo sheet1 (2)
Lucagbo sheet1 (2)
 
Chap2 lab2 jackson's bright ideas sheet1
Chap2 lab2 jackson's bright ideas sheet1Chap2 lab2 jackson's bright ideas sheet1
Chap2 lab2 jackson's bright ideas sheet1
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
 
Six sigma...by raziel lucagbo
Six sigma...by raziel lucagboSix sigma...by raziel lucagbo
Six sigma...by raziel lucagbo
 
Android...by raziel lucagbo
Android...by raziel lucagboAndroid...by raziel lucagbo
Android...by raziel lucagbo
 
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
(Lucagbo) lab 1 1 konas espresso coffee annual cost of goods-1 sheet1
 
Lucagbo 1 sheet1
Lucagbo 1 sheet1Lucagbo 1 sheet1
Lucagbo 1 sheet1
 
Lucagbo 1 sheet1
Lucagbo 1 sheet1Lucagbo 1 sheet1
Lucagbo 1 sheet1
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Computer forensics paper

  • 1. Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />COMPUTER FORENSICS SPECIALIST<br /> Computer forensics also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.<br /> A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to (Shelly and Cashman)(Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialists must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and updates skills, and a knack for problem solving.<br /> When a problem occurs, it is the responsibility of the computer forensics specialists to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and /or testimony as required (Reinman 52-58)<br /> A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry-level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell and Gutierrez 44-45)<br /> With the growing use of computers in all areas of life, the number of computer crime surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited BIBLIOGRAPHY Reinman, David P. quot; Fighting Cybercriminals.quot; Cybertech Monthly February 2008: 52-58.Shelly, Gary B. and Thomas J. Cashman. quot; Computer Careers.quot; Course Technology 7 March 2008: <www.scsite.com/wd2007/pr2/wc.htm>.Turell, Marcia O. and Alex N. Gutierrez. Cybercrimes and Criminals El Paso: Legal Works Publishing Company 2008: 44-45.<br />