SlideShare una empresa de Scribd logo
1 de 2
Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />           Computer Forensics, also called digital Forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and network. Because computers and the internet are the fastest growing technology used for  criminal activity, the need for computer forensics specialists will increase in year to come.<br />          A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and network. According to Shelly and Cashman (Computer Careers), may areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills,  willingness to learn and update skills, and a knack for problem solving.<br />         When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58)<br />        A  computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture  and hardware design. In the pst, many computer forensics specialist were self-taught computer users. Today, extensive training usually from several different source, is required. A degree in Computer Science should be supplemented with graduate course and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55).<br />        With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited<br />Reinman,  David P. “Fighting Cybercriminals.” Cybertech Monthly Febuary 2008: 52-58.<br />Shelly,  Gary B., and Thomas J. Cashman. “Computer  Careers. “Course Technology. 7 March 2008 <www.scsite.com/wd2007/pr2/wc.htm><br />Turell. Marcia O.,  and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company,2008.<br />
Hamilton lara computer forensics specialist

Más contenido relacionado

Destacado (19)

CS 542 -- Query Execution
CS 542 -- Query ExecutionCS 542 -- Query Execution
CS 542 -- Query Execution
 
Presentation1
Presentation1Presentation1
Presentation1
 
Diseñando apps para niños wu dco2013
Diseñando apps para niños   wu dco2013Diseñando apps para niños   wu dco2013
Diseñando apps para niños wu dco2013
 
Tercera unidad ;3
Tercera unidad ;3Tercera unidad ;3
Tercera unidad ;3
 
Proyecto interactivo
Proyecto interactivoProyecto interactivo
Proyecto interactivo
 
Telecomid2010 tv futuro
Telecomid2010 tv futuroTelecomid2010 tv futuro
Telecomid2010 tv futuro
 
Cost of quality
Cost of qualityCost of quality
Cost of quality
 
Parmentier 01
Parmentier 01Parmentier 01
Parmentier 01
 
Chap08 data abstraction
Chap08   data abstractionChap08   data abstraction
Chap08 data abstraction
 
F lamina 70 x100
F lamina 70 x100F lamina 70 x100
F lamina 70 x100
 
Animal science workbook pashto
Animal science workbook pashtoAnimal science workbook pashto
Animal science workbook pashto
 
Avance proyecto
Avance proyectoAvance proyecto
Avance proyecto
 
Un tomb pel barri
Un tomb pel barriUn tomb pel barri
Un tomb pel barri
 
162 georges rouault-peintre
162 georges rouault-peintre162 georges rouault-peintre
162 georges rouault-peintre
 
Atikan
AtikanAtikan
Atikan
 
EL SOFTWARE
EL SOFTWAREEL SOFTWARE
EL SOFTWARE
 
Social network
Social networkSocial network
Social network
 
Softwaremlf
SoftwaremlfSoftwaremlf
Softwaremlf
 
Informations Technology
Informations TechnologyInformations Technology
Informations Technology
 

Más de Lorie Jane Abao

Home networks by hamilton lara
Home networks by hamilton laraHome networks by hamilton lara
Home networks by hamilton lara
Lorie Jane Abao
 
Home networks by hamilton lara
Home networks by hamilton laraHome networks by hamilton lara
Home networks by hamilton lara
Lorie Jane Abao
 
Growing in generosity.pptx hamilton lara.pptx new
Growing in generosity.pptx hamilton lara.pptx newGrowing in generosity.pptx hamilton lara.pptx new
Growing in generosity.pptx hamilton lara.pptx new
Lorie Jane Abao
 
Growing in generosity.pptx hamilton lara
Growing in generosity.pptx hamilton laraGrowing in generosity.pptx hamilton lara
Growing in generosity.pptx hamilton lara
Lorie Jane Abao
 
Protect your good name hamilton lara
Protect your good name hamilton laraProtect your good name hamilton lara
Protect your good name hamilton lara
Lorie Jane Abao
 
Recycling of household waste hamilton lara
Recycling of household waste hamilton laraRecycling of household waste hamilton lara
Recycling of household waste hamilton lara
Lorie Jane Abao
 
It was a fun and messy adventure hamilton
It was a fun and messy adventure hamiltonIt was a fun and messy adventure hamilton
It was a fun and messy adventure hamilton
Lorie Jane Abao
 
Hamilton lara philippines
Hamilton lara philippinesHamilton lara philippines
Hamilton lara philippines
Lorie Jane Abao
 
Guevarra institute of technology hamilton lara
Guevarra institute of technology hamilton laraGuevarra institute of technology hamilton lara
Guevarra institute of technology hamilton lara
Lorie Jane Abao
 
Ice cream shop for sale hamilton lara
Ice cream shop for sale hamilton laraIce cream shop for sale hamilton lara
Ice cream shop for sale hamilton lara
Lorie Jane Abao
 
Give yourself some credit hamilton lara
Give yourself some credit hamilton laraGive yourself some credit hamilton lara
Give yourself some credit hamilton lara
Lorie Jane Abao
 
Hamilton lara give yourself some credit
Hamilton lara give yourself some creditHamilton lara give yourself some credit
Hamilton lara give yourself some credit
Lorie Jane Abao
 
Rent a cabin hamilton lara
Rent a cabin hamilton laraRent a cabin hamilton lara
Rent a cabin hamilton lara
Lorie Jane Abao
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
Lorie Jane Abao
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
Lorie Jane Abao
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
Lorie Jane Abao
 

Más de Lorie Jane Abao (20)

Home networks by hamilton lara
Home networks by hamilton laraHome networks by hamilton lara
Home networks by hamilton lara
 
Home networks by hamilton lara
Home networks by hamilton laraHome networks by hamilton lara
Home networks by hamilton lara
 
Growing in generosity.pptx hamilton lara.pptx new
Growing in generosity.pptx hamilton lara.pptx newGrowing in generosity.pptx hamilton lara.pptx new
Growing in generosity.pptx hamilton lara.pptx new
 
Growing in generosity.pptx hamilton lara
Growing in generosity.pptx hamilton laraGrowing in generosity.pptx hamilton lara
Growing in generosity.pptx hamilton lara
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Protect your good name hamilton lara
Protect your good name hamilton laraProtect your good name hamilton lara
Protect your good name hamilton lara
 
Recycling of household waste hamilton lara
Recycling of household waste hamilton laraRecycling of household waste hamilton lara
Recycling of household waste hamilton lara
 
It was a fun and messy adventure hamilton
It was a fun and messy adventure hamiltonIt was a fun and messy adventure hamilton
It was a fun and messy adventure hamilton
 
Hamilton lara kids bank
Hamilton lara kids bankHamilton lara kids bank
Hamilton lara kids bank
 
Hamliton
HamlitonHamliton
Hamliton
 
Hamliton
HamlitonHamliton
Hamliton
 
Hamilton lara philippines
Hamilton lara philippinesHamilton lara philippines
Hamilton lara philippines
 
Guevarra institute of technology hamilton lara
Guevarra institute of technology hamilton laraGuevarra institute of technology hamilton lara
Guevarra institute of technology hamilton lara
 
Ice cream shop for sale hamilton lara
Ice cream shop for sale hamilton laraIce cream shop for sale hamilton lara
Ice cream shop for sale hamilton lara
 
Give yourself some credit hamilton lara
Give yourself some credit hamilton laraGive yourself some credit hamilton lara
Give yourself some credit hamilton lara
 
Hamilton lara give yourself some credit
Hamilton lara give yourself some creditHamilton lara give yourself some credit
Hamilton lara give yourself some credit
 
Rent a cabin hamilton lara
Rent a cabin hamilton laraRent a cabin hamilton lara
Rent a cabin hamilton lara
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Hamilton lara computer forensics specialist

  • 1. Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br /> Computer Forensics, also called digital Forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and network. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in year to come.<br /> A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and network. According to Shelly and Cashman (Computer Careers), may areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, willingness to learn and update skills, and a knack for problem solving.<br /> When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58)<br /> A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the pst, many computer forensics specialist were self-taught computer users. Today, extensive training usually from several different source, is required. A degree in Computer Science should be supplemented with graduate course and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55).<br /> With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited<br />Reinman, David P. “Fighting Cybercriminals.” Cybertech Monthly Febuary 2008: 52-58.<br />Shelly, Gary B., and Thomas J. Cashman. “Computer Careers. “Course Technology. 7 March 2008 <www.scsite.com/wd2007/pr2/wc.htm><br />Turell. Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company,2008.<br />