SlideShare a Scribd company logo
1 of 3
Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involved gathering and analyzing evidence from computer and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increased in years to come.<br />A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to (shelly & cashman, 2008)(computer careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, a willingness to learn and update skills, and a knack for problem solving.<br />When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required  (reinman, 2008).<br />A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate course and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications salaries can exceed $125,000 (Turrel, 2008)<br />With growing used of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited<br />Reinman, David P. ”fighting Cybercriminals.” Cybertech Monthly February 2008: 52-58.<br />Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 march 2008<br />www.scsite.com/wd2007/pr2/wc.htm.<br />Turkell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing <br />company, 2008<br />
Computer Forensics Specialist - Gathering Digital Evidence
Computer Forensics Specialist - Gathering Digital Evidence

More Related Content

What's hot

Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1maranan_alexa
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)jeremargwapo
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Studentsrainrjcahili
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingBryan Len
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 

What's hot (20)

Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Lab 1
Lab 1Lab 1
Lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 

Viewers also liked

Viewers also liked (6)

antivirus
antivirusantivirus
antivirus
 
Airplane rides lord durana
Airplane rides lord duranaAirplane rides lord durana
Airplane rides lord durana
 
Katrina group presentation ppt
Katrina group presentation pptKatrina group presentation ppt
Katrina group presentation ppt
 
Costos de Apertura de un Club Toastmasters
Costos de Apertura de un Club ToastmastersCostos de Apertura de un Club Toastmasters
Costos de Apertura de un Club Toastmasters
 
Alliance high school_bi_fold
Alliance high school_bi_foldAlliance high school_bi_fold
Alliance high school_bi_fold
 
Qa 2
Qa 2Qa 2
Qa 2
 

Similar to Computer Forensics Specialist - Gathering Digital Evidence

Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2guest4ea1460
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipnerikent neri
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 

Similar to Computer Forensics Specialist - Gathering Digital Evidence (15)

Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Forensics
ForensicsForensics
Forensics
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 

More from lord_durana

In the vialla dvd rental( durana lord) sheet1
In the vialla dvd rental( durana lord) sheet1In the vialla dvd rental( durana lord) sheet1
In the vialla dvd rental( durana lord) sheet1lord_durana
 
Scissors office supply (durana lord)
Scissors office supply (durana lord)Scissors office supply (durana lord)
Scissors office supply (durana lord)lord_durana
 
Chap2 case2 doze-now profit potentia(durana) sheet1
Chap2 case2 doze-now profit potentia(durana) sheet1Chap2 case2 doze-now profit potentia(durana) sheet1
Chap2 case2 doze-now profit potentia(durana) sheet1lord_durana
 
Chap 2 lab 2(lord durana) sheet1
Chap 2 lab 2(lord durana) sheet1Chap 2 lab 2(lord durana) sheet1
Chap 2 lab 2(lord durana) sheet1lord_durana
 
Spoke up bicycle shop(durana) sheet1
Spoke up bicycle shop(durana) sheet1Spoke up bicycle shop(durana) sheet1
Spoke up bicycle shop(durana) sheet1lord_durana
 
Actvities with corresponding calories burned(durana lord) sheet1
Actvities with corresponding calories burned(durana lord) sheet1Actvities with corresponding calories burned(durana lord) sheet1
Actvities with corresponding calories burned(durana lord) sheet1lord_durana
 
Lab 1 3 part 1 college cost and financial support(lord durana) sheet1
Lab 1 3 part 1 college cost and financial support(lord durana) sheet1Lab 1 3 part 1 college cost and financial support(lord durana) sheet1
Lab 1 3 part 1 college cost and financial support(lord durana) sheet1lord_durana
 
K ona's expresso coffee(durana) sheet1
K ona's expresso coffee(durana) sheet1K ona's expresso coffee(durana) sheet1
K ona's expresso coffee(durana) sheet1lord_durana
 
Quarterly environmental club budget sheet1
Quarterly environmental club budget sheet1Quarterly environmental club budget sheet1
Quarterly environmental club budget sheet1lord_durana
 
Walk and rock music ( durana) sheet1
Walk and rock music ( durana) sheet1Walk and rock music ( durana) sheet1
Walk and rock music ( durana) sheet1lord_durana
 
Truly i say to you that this
Truly i say to you that thisTruly i say to you that this
Truly i say to you that thislord_durana
 
Protect your good name
Protect your good nameProtect your good name
Protect your good namelord_durana
 
Verbaction or state gdg
Verbaction or state gdgVerbaction or state gdg
Verbaction or state gdglord_durana
 
South haven park district 2
South haven park district 2South haven park district 2
South haven park district 2lord_durana
 
South haven park district lord
South haven park district lordSouth haven park district lord
South haven park district lordlord_durana
 

More from lord_durana (20)

In the vialla dvd rental( durana lord) sheet1
In the vialla dvd rental( durana lord) sheet1In the vialla dvd rental( durana lord) sheet1
In the vialla dvd rental( durana lord) sheet1
 
Scissors office supply (durana lord)
Scissors office supply (durana lord)Scissors office supply (durana lord)
Scissors office supply (durana lord)
 
Chap2 case2 doze-now profit potentia(durana) sheet1
Chap2 case2 doze-now profit potentia(durana) sheet1Chap2 case2 doze-now profit potentia(durana) sheet1
Chap2 case2 doze-now profit potentia(durana) sheet1
 
Chap 2 lab 2(lord durana) sheet1
Chap 2 lab 2(lord durana) sheet1Chap 2 lab 2(lord durana) sheet1
Chap 2 lab 2(lord durana) sheet1
 
Spoke up bicycle shop(durana) sheet1
Spoke up bicycle shop(durana) sheet1Spoke up bicycle shop(durana) sheet1
Spoke up bicycle shop(durana) sheet1
 
Actvities with corresponding calories burned(durana lord) sheet1
Actvities with corresponding calories burned(durana lord) sheet1Actvities with corresponding calories burned(durana lord) sheet1
Actvities with corresponding calories burned(durana lord) sheet1
 
Lab 1 3 part 1 college cost and financial support(lord durana) sheet1
Lab 1 3 part 1 college cost and financial support(lord durana) sheet1Lab 1 3 part 1 college cost and financial support(lord durana) sheet1
Lab 1 3 part 1 college cost and financial support(lord durana) sheet1
 
Apple mac os
Apple mac osApple mac os
Apple mac os
 
K ona's expresso coffee(durana) sheet1
K ona's expresso coffee(durana) sheet1K ona's expresso coffee(durana) sheet1
K ona's expresso coffee(durana) sheet1
 
Quarterly environmental club budget sheet1
Quarterly environmental club budget sheet1Quarterly environmental club budget sheet1
Quarterly environmental club budget sheet1
 
Walk and rock music ( durana) sheet1
Walk and rock music ( durana) sheet1Walk and rock music ( durana) sheet1
Walk and rock music ( durana) sheet1
 
Truly i say to you that this
Truly i say to you that thisTruly i say to you that this
Truly i say to you that this
 
Protect your good name
Protect your good nameProtect your good name
Protect your good name
 
Doc talent
Doc talentDoc talent
Doc talent
 
Df
DfDf
Df
 
Verbaction or state gdg
Verbaction or state gdgVerbaction or state gdg
Verbaction or state gdg
 
Recycling lord
Recycling  lordRecycling  lord
Recycling lord
 
South haven park district 2
South haven park district 2South haven park district 2
South haven park district 2
 
South haven park district lord
South haven park district lordSouth haven park district lord
South haven park district lord
 
Philippines
PhilippinesPhilippines
Philippines
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Computer Forensics Specialist - Gathering Digital Evidence

  • 1. Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involved gathering and analyzing evidence from computer and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increased in years to come.<br />A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to (shelly & cashman, 2008)(computer careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, a willingness to learn and update skills, and a knack for problem solving.<br />When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (reinman, 2008).<br />A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate course and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications salaries can exceed $125,000 (Turrel, 2008)<br />With growing used of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited<br />Reinman, David P. ”fighting Cybercriminals.” Cybertech Monthly February 2008: 52-58.<br />Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 march 2008<br />www.scsite.com/wd2007/pr2/wc.htm.<br />Turkell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing <br />company, 2008<br />