SlideShare uma empresa Scribd logo
1 de 3
Hankins 1


        Mary Hankins

        Mr. Habib

        Business 102

        14 March 2008

                                       Computer Forensics Specialist

      Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly

growing field that involves gathering and analyzing evidence from computers and networks. Because

computers and the Internet are the fastest growing technology used for criminal activity, the need for

computer forensics specialist will increase in years to come.


      A computer forensics specialist examines computer media, programs, data, and log files on

computers, servers, and networks. According to Shelly and Cashman (Shelly)many areas employ

computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence,

insurance agencies, and information security departments in the private sector. A computer forensics

specialist must have knowledge of the law, technical experience with many types of hardware and

software products, superior communications skills, a willingness to learn and update skills, and a knack

for problem solving.


      When a problem occurs, it is the responsibility of the computer forensics specialist to carefully

take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer .

These steps include protecting the suspect’s computer, discovering all files, recovering deleted files,

revealing hidden files, accesing protected or encrypted files, analyzing all the data, and providing expert

consultation and/or testimony as required (Reinman 52-58).


      A computer forensics specialist must have knowledge of all aspects of the computer, from the
operating system to computer architecture and hardware design. In the past, many computer forensics
specialist were self-taught compter users. Today, extensive training, usually from several different
Hankins 2


      Sources, is required. A degree in Computer Science should be supplemented with graduate

courses and university-level professional development certificates. Entry level salaries range from

$45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55).


      With the growing use of computers in all areas of life, the number of computer crimes surely will

continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many

years to come.
Hankins 3


                                     Works Cited
Reinman, David p. "Fighting Cybercriminals." Cybertech Monthly 7 February 2008: 52-58.

Shelly, Gary b., and Thomas J. Cashman. Computer Careers. 7 March 2008.
<<www.scsite.com/wd2007/pr2/wc.htm>.>.

Turell, Marcia O, and Alex N. Gutierrez. "Cybercrimes and Criminals."El Paso: Legal Works
Publishing Company (2008): 44-55.

Mais conteúdo relacionado

Mais procurados

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
Arber Hoxhallari
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
Omid Aminzadeh Gohari
 

Mais procurados (20)

Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Lab 1
Lab 1Lab 1
Lab 1
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Data Security
Data SecurityData Security
Data Security
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 

Destaque

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)
kent neri
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)
kent neri
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)
kent neri
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2
mehhhh
 

Destaque (7)

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Semelhante a Kent philipneri

Semelhante a Kent philipneri (20)

Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Jenevie
JenevieJenevie
Jenevie
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Hankins (merjo)
Hankins (merjo)Hankins (merjo)
Hankins (merjo)
 

Mais de kent neri

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1
kent neri
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)
kent neri
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )
kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
kent neri
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)
kent neri
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)
kent neri
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
kent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
kent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
kent neri
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
kent neri
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
kent neri
 

Mais de kent neri (18)

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)
 
Craft barn
Craft barnCraft barn
Craft barn
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Play ball
Play ballPlay ball
Play ball
 
Play ball
Play ballPlay ball
Play ball
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Kent philipneri

  • 1. Hankins 1 Mary Hankins Mr. Habib Business 102 14 March 2008  Computer Forensics Specialist Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialist will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cashman (Shelly)many areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer . These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accesing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58). A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialist were self-taught compter users. Today, extensive training, usually from several different
  • 2. Hankins 2 Sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55). With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.
  • 3. Hankins 3 Works Cited Reinman, David p. "Fighting Cybercriminals." Cybertech Monthly 7 February 2008: 52-58. Shelly, Gary b., and Thomas J. Cashman. Computer Careers. 7 March 2008. <<www.scsite.com/wd2007/pr2/wc.htm>.>. Turell, Marcia O, and Alex N. Gutierrez. "Cybercrimes and Criminals."El Paso: Legal Works Publishing Company (2008): 44-55.