SlideShare a Scribd company logo
Hankins 1


Mary Hankins


Mr. Habib


Business 102


14 March 2008


                                                  Computer Forensics Specialist


            Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field

that involves gathering and analyzing evidence from computers and networks. Because the computers and internet are the

fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to

come.


            A computer forensics specialist examines computer media, programs, data, and log files on computers, servers,

and networks. According to Shelly and Cash man (Computer Careers), many areas employ computer forensics specialist,

including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security

departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience of

much type of hardware and software products, superior communication skills, a willingness to learn and update skills, and

a knack for problem solving.


            When a problem occurs, is the responsibility of the computer or forensics specialist to carefully take several

steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the

suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted

files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58)
Hankins 2


         A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system

to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught

computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer

Science should be supplemented with graduate courses and university-level professional development certificates. Entry

level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-

55)


         With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise.

As a result, the needed for skilled specialist to battle these crimes will increase for many years to come.




                                                        Works cited
Hankins 3


Reinman, David P. “Fighting Cydercriminals.” Cybertech Monthly February 2008: 52-28.

Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008

        www.scsite.com/wd2007/pr2/wc.htm.

Turell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing

        Company, 2008.

More Related Content

DOCX
(Alexa 09) chap.2 lab 1
DOCX
Hankins 1 (Ej Guevarra)
DOCX
Mjtanasas2
DOCX
Hankins by {bryan23}
DOC
Computer Forensics Specialist Lab 1 From Word Chapter 2
DOCX
DOCX
Chap2 lab1
DOCX
Maranan chap.2 lab 1
(Alexa 09) chap.2 lab 1
Hankins 1 (Ej Guevarra)
Mjtanasas2
Hankins by {bryan23}
Computer Forensics Specialist Lab 1 From Word Chapter 2
Chap2 lab1
Maranan chap.2 lab 1

What's hot (20)

DOCX
DOCX
Computer forensics paper ---neri
DOCX
Computer forensics paper
DOCX
Computer Forensics Specialist
DOCX
Cataluña computer forensics specialist
DOCX
Cataluña computer forensics specialist
DOCX
Mary hankins(lord)
DOCX
Cataluña mary hapkins
DOCX
Brua computer forensics specialist
DOCX
Mary hankins fernando br ua
DOCX
Kent philipneri
DOCX
Markbrakent war
DOCX
Research paper -- neri
DOCX
Zamayla chap2 lab 1
DOCX
Dungogan chap2 lab 1
DOCX
Kent philip neri (lab 2)
DOCX
Kent philip neri (lab 2)
DOCX
Sabate chap2 lab1
DOCX
Lab 1a computer forensic specialist
PPTX
Digital forensics
Computer forensics paper ---neri
Computer forensics paper
Computer Forensics Specialist
Cataluña computer forensics specialist
Cataluña computer forensics specialist
Mary hankins(lord)
Cataluña mary hapkins
Brua computer forensics specialist
Mary hankins fernando br ua
Kent philipneri
Markbrakent war
Research paper -- neri
Zamayla chap2 lab 1
Dungogan chap2 lab 1
Kent philip neri (lab 2)
Kent philip neri (lab 2)
Sabate chap2 lab1
Lab 1a computer forensic specialist
Digital forensics
Ad

Viewers also liked (8)

PPTX
Arriben els patges a l’escola
PDF
Impressora | Série F - Comercial
PPS
How to shows_our_kindness__1__2_[1]....
PPS
Attitude
PPT
Can treo dien tu
RTF
poèmes
DOCX
Itil quality management
PDF
Verpleegkundig Jaarboek 2010-2014
Arriben els patges a l’escola
Impressora | Série F - Comercial
How to shows_our_kindness__1__2_[1]....
Attitude
Can treo dien tu
poèmes
Itil quality management
Verpleegkundig Jaarboek 2010-2014
Ad

Similar to (kevin 09) chap.2 lab 1 kvin(1) (15)

DOCX
Mjtanasas1
DOCX
Hankins (merjo)
DOCX
Project_Paper_ISSC455_Intindolo
PPT
Computer forensics 1
PPTX
COMPUTER FORENSICS.pptx
DOCX
Computer Forensics: The Emerging Significance to Law Enforcement
PDF
III year VI sem CYber forensics material
PPT
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
PPT
cyber forensics - TYPES OF CYBER FORENSICS.ppt
PDF
Computer forensics vital_for_combating_cyber_crimes
PPTX
Business Intelligence (BI) Tools For Computer Forensic
PDF
The Realm Of Digital Forensics
PDF
Computer forensic
PPTX
Digital&computforensic
PPT
Role of a Forensic Investigator
Mjtanasas1
Hankins (merjo)
Project_Paper_ISSC455_Intindolo
Computer forensics 1
COMPUTER FORENSICS.pptx
Computer Forensics: The Emerging Significance to Law Enforcement
III year VI sem CYber forensics material
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
cyber forensics - TYPES OF CYBER FORENSICS.ppt
Computer forensics vital_for_combating_cyber_crimes
Business Intelligence (BI) Tools For Computer Forensic
The Realm Of Digital Forensics
Computer forensic
Digital&computforensic
Role of a Forensic Investigator

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Cloud computing and distributed systems.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
20250228 LYD VKU AI Blended-Learning.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx

(kevin 09) chap.2 lab 1 kvin(1)

  • 1. Hankins 1 Mary Hankins Mr. Habib Business 102 14 March 2008 Computer Forensics Specialist Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because the computers and internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cash man (Computer Careers), many areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience of much type of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, is the responsibility of the computer or forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58)
  • 2. Hankins 2 A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44- 55) With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the needed for skilled specialist to battle these crimes will increase for many years to come. Works cited
  • 3. Hankins 3 Reinman, David P. “Fighting Cydercriminals.” Cybertech Monthly February 2008: 52-28. Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008 www.scsite.com/wd2007/pr2/wc.htm. Turell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company, 2008.