SlideShare a Scribd company logo
Hankins 1




Mary hankins

Mr. Habib

Business

14 March 2008

                              Computer forensics specialist

       Computer forensics, also called digital forensics, network forensics, or

cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence

from computers and networks.because computers and the internet are the fastest

growing technology used for criminal activity, the need for computer forensics

specialists will increase in years to come.

       A computer forentics specialist examines computer ,media, programs, data, and

files on computers, servers, and networks. According to Shelly and Cashman

(Computer Careers), many areas employ computer forensics specialists, including law

enforcement, criminal prosecutors, military intelligence, insurance agencies, and

information security and information security departments in the private sector, a

computer forensics specialist must have knowledge of the law, technical experience

with many types of hardware and software products, superior communication skills, a

willingness to learn and update skills, and a knack for problem solving.

       When a problem occurs, it is the responsibility of the computer forensics

specialist to carefully take several steps to identify and retrieve possible evidence that

mat exist on a suspect’s computer. These steps include protecting the suspect’s

computer, discovering all files, recovering deleted files, tevealin hidden files, accessing
Hankins 1


protected or encryped files, analyzing all the data, and providing expert consultation

and/or testimony as required (Reinman 52-58)

       A computer forensics must have knowledge of all aspects of the comuter, from

the operating systems to computer architecture and hardware desing, in the past, many

computer forentics specialists were self-taught computer users. Today, extensive

training, usually from several different sources, is required. A degree in Computer

Science should be supplemented with graduate courses and university –level

professional development certificates. Entry level salaries range from $45,000 to

$75,000 with experience and certifications, salaries can exceed $ 125,000 (Turell 44-

55).

       With the growing use of computers in all areas of life, the number of computer

crimes surely will continue to rise. As a result, the need for skilled specialists to battle

these crimes will increase for many years to come.
Hankins 1


                                     Works cited



Reinman, David P. :”Fighting Cyber criminals.” Cybertech Monthly February 2008: 52-

58.

Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7

March 2008

                         www.scsite.com/wd2007/pr2/wc.htm.



Turell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal

Works Publishing Company, 2008.

More Related Content

What's hot

Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1maranan_zyra
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
Jennifer Cataluña
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2guest4ea1460
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)lord_durana
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neriaejay_neri
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
heidirobison
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
dentpress
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
rainrjcahili
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
amiable_indian
 

What's hot (20)

Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 

Similar to Lab 1

Kent philipneri
Kent philipneriKent philipneri
Kent philipnerikent neri
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
Donald Tabone
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
JIEMS Akkalkuwa
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
lillian Kobusingye
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
evonnehoggarth79783
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 

Similar to Lab 1 (13)

Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Forensics
ForensicsForensics
Forensics
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 

More from novelinbabate2 (20)

Cover letter
Cover letterCover letter
Cover letter
 
Novelin campilan babate
Novelin campilan babateNovelin campilan babate
Novelin campilan babate
 
Lab 3
Lab 3Lab 3
Lab 3
 
Apply3 1
Apply3 1Apply3 1
Apply3 1
 
Rent a cabin
Rent a cabinRent a cabin
Rent a cabin
 
Blooming deals
Blooming dealsBlooming deals
Blooming deals
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
 
Lab 2
Lab 2Lab 2
Lab 2
 
Research paper 2 (1)
Research paper 2 (1)Research paper 2 (1)
Research paper 2 (1)
 
Midterm
MidtermMidterm
Midterm
 
Ice cream 3
Ice cream 3Ice cream 3
Ice cream 3
 
Ice cream 3
Ice cream 3Ice cream 3
Ice cream 3
 
Ice cream 2
Ice cream 2Ice cream 2
Ice cream 2
 
Ice cream 2
Ice cream 2Ice cream 2
Ice cream 2
 
The tailoring
The tailoringThe tailoring
The tailoring
 
Ice cream
Ice creamIce cream
Ice cream
 
Ice cream
Ice creamIce cream
Ice cream
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Craft barn
Craft barnCraft barn
Craft barn
 
Rent a cabin
Rent a cabinRent a cabin
Rent a cabin
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Lab 1

  • 1. Hankins 1 Mary hankins Mr. Habib Business 14 March 2008 Computer forensics specialist Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks.because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come. A computer forentics specialist examines computer ,media, programs, data, and files on computers, servers, and networks. According to Shelly and Cashman (Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security and information security departments in the private sector, a computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that mat exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, tevealin hidden files, accessing
  • 2. Hankins 1 protected or encryped files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58) A computer forensics must have knowledge of all aspects of the comuter, from the operating systems to computer architecture and hardware desing, in the past, many computer forentics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university –level professional development certificates. Entry level salaries range from $45,000 to $75,000 with experience and certifications, salaries can exceed $ 125,000 (Turell 44- 55). With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.
  • 3. Hankins 1 Works cited Reinman, David P. :”Fighting Cyber criminals.” Cybertech Monthly February 2008: 52- 58. Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008 www.scsite.com/wd2007/pr2/wc.htm. Turell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company, 2008.