SlideShare a Scribd company logo
Mary Hankins <br />Mr. Habbib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity. The need for computer forensics specialist will increase in years to come.<br />      A Computer forensics specialist examines computer  media, programs, data, and log files on computers, servers, and networks, According the Shelly and Cash man (Computer Careers,) many areas employ computer forensics specialist, including law enforcement, criminal processors, military Intelligence, insurance agencies, and information security departments in the private sector. A Computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, and willingness to learn and update skills, and a knack for problem solving.<br />       When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to indentify and receive possible evidence that may exists on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data. And providing expert consultation and/or testimony as required (Rein man 52-58).<br />       A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialist were self-taught computer users. Today, extensive training from several different<br />
Sabate chap2 lab1

More Related Content

DOCX
Zamayla chap2 lab 1
DOCX
Dungogan chap2 lab 1
DOCX
Maranan chap.2 lab 1
DOCX
Mjtanasas2
DOCX
DOCX
Computer forensics paper
DOCX
Computer forensics paper ---neri
DOCX
Computer Forensics Specialist
Zamayla chap2 lab 1
Dungogan chap2 lab 1
Maranan chap.2 lab 1
Mjtanasas2
Computer forensics paper
Computer forensics paper ---neri
Computer Forensics Specialist

What's hot (20)

DOCX
Research paper -- neri
DOCX
Cataluña computer forensics specialist
DOCX
Cataluña computer forensics specialist
DOCX
Cataluña mary hapkins
DOCX
Brua computer forensics specialist
DOCX
Mary hankins fernando br ua
DOCX
Chap2 lab1
DOCX
Mary hankins(lord)
DOCX
Hankins by {bryan23}
DOCX
DOCX
(Alexa 09) chap.2 lab 1
DOCX
Lab 1a computer forensic specialist
PPTX
Digital forensics
DOCX
(kevin 09) chap.2 lab 1 kvin(1)
PPTX
CYBERFORENSICS
DOCX
Markbrakent war
DOC
Computer Forensics Specialist Lab 1 From Word Chapter 2
PPTX
Computer crimes and forensics
DOCX
Hankins 1 (Ej Guevarra)
PPTX
Acc 626 slidecast
Research paper -- neri
Cataluña computer forensics specialist
Cataluña computer forensics specialist
Cataluña mary hapkins
Brua computer forensics specialist
Mary hankins fernando br ua
Chap2 lab1
Mary hankins(lord)
Hankins by {bryan23}
(Alexa 09) chap.2 lab 1
Lab 1a computer forensic specialist
Digital forensics
(kevin 09) chap.2 lab 1 kvin(1)
CYBERFORENSICS
Markbrakent war
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer crimes and forensics
Hankins 1 (Ej Guevarra)
Acc 626 slidecast
Ad

Similar to Sabate chap2 lab1 (13)

DOCX
Mjtanasas1
DOCX
Kent philipneri
PDF
4.content (computer forensic)
PPTX
ppt on computer forensic concept and types
DOCX
Forensics
PDF
Computer forensic
PPTX
Lessons v on fraud awareness (digital forensics) [autosaved]
PPTX
Lessons v on fraud awareness (digital forensics)
PDF
III year VI sem CYber forensics material
PDF
Computer forensics investigation and digital forensics services
PPT
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
DOCX
R15 a0533 cf converted
PPT
Secure Computer Forensics and its tools
Mjtanasas1
Kent philipneri
4.content (computer forensic)
ppt on computer forensic concept and types
Forensics
Computer forensic
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics)
III year VI sem CYber forensics material
Computer forensics investigation and digital forensics services
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
R15 a0533 cf converted
Secure Computer Forensics and its tools
Ad

More from }{it -Boy (10)

DOCX
Sabate chap2 lab2
DOCX
Sabate lab 1 chap3
DOCX
Sabate chap1 lab2
DOCX
Advertises
DOCX
Advertises
DOCX
Advertises
DOCX
Advertises
DOCX
Working togther
DOCX
Lakefront lot
DOCX
Lakefront lot
Sabate chap2 lab2
Sabate lab 1 chap3
Sabate chap1 lab2
Advertises
Advertises
Advertises
Advertises
Working togther
Lakefront lot
Lakefront lot

Sabate chap2 lab1

  • 1. Mary Hankins <br />Mr. Habbib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity. The need for computer forensics specialist will increase in years to come.<br /> A Computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks, According the Shelly and Cash man (Computer Careers,) many areas employ computer forensics specialist, including law enforcement, criminal processors, military Intelligence, insurance agencies, and information security departments in the private sector. A Computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, and willingness to learn and update skills, and a knack for problem solving.<br /> When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to indentify and receive possible evidence that may exists on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data. And providing expert consultation and/or testimony as required (Rein man 52-58).<br /> A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialist were self-taught computer users. Today, extensive training from several different<br />