SlideShare una empresa de Scribd logo
1 de 2
Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />           Computer Forensics, also called digital Forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and network. Because computers and the internet are the fastest growing technology used for  criminal activity, the need for computer forensics specialists will increase in year to come.<br />          A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and network. According to Shelly and Cashman (Computer Careers), may areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills,  willingness to learn and update skills, and a knack for problem solving.<br />         When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58)<br />        A  computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture  and hardware design. In the pst, many computer forensics specialist were self-taught computer users. Today, extensive training usually from several different source, is required. A degree in Computer Science should be supplemented with graduate course and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55).<br />        With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited<br />Reinman,  David P. “Fighting Cybercriminals.” Cybertech Monthly Febuary 2008: 52-58.<br />Shelly,  Gary B., and Thomas J. Cashman. “Computer  Careers. “Course Technology. 7 March 2008 <www.scsite.com/wd2007/pr2/wc.htm><br />Turell. Marcia O.,  and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company,2008.<br />
Hamilton lara computer forensics specialist

Más contenido relacionado

Destacado (19)

CS 542 -- Query Execution
CS 542 -- Query ExecutionCS 542 -- Query Execution
CS 542 -- Query Execution
 
Presentation1
Presentation1Presentation1
Presentation1
 
Diseñando apps para niños wu dco2013
Diseñando apps para niños   wu dco2013Diseñando apps para niños   wu dco2013
Diseñando apps para niños wu dco2013
 
Tercera unidad ;3
Tercera unidad ;3Tercera unidad ;3
Tercera unidad ;3
 
Proyecto interactivo
Proyecto interactivoProyecto interactivo
Proyecto interactivo
 
Telecomid2010 tv futuro
Telecomid2010 tv futuroTelecomid2010 tv futuro
Telecomid2010 tv futuro
 
Cost of quality
Cost of qualityCost of quality
Cost of quality
 
Parmentier 01
Parmentier 01Parmentier 01
Parmentier 01
 
Chap08 data abstraction
Chap08   data abstractionChap08   data abstraction
Chap08 data abstraction
 
F lamina 70 x100
F lamina 70 x100F lamina 70 x100
F lamina 70 x100
 
Animal science workbook pashto
Animal science workbook pashtoAnimal science workbook pashto
Animal science workbook pashto
 
Avance proyecto
Avance proyectoAvance proyecto
Avance proyecto
 
Un tomb pel barri
Un tomb pel barriUn tomb pel barri
Un tomb pel barri
 
162 georges rouault-peintre
162 georges rouault-peintre162 georges rouault-peintre
162 georges rouault-peintre
 
Atikan
AtikanAtikan
Atikan
 
EL SOFTWARE
EL SOFTWAREEL SOFTWARE
EL SOFTWARE
 
Social network
Social networkSocial network
Social network
 
Softwaremlf
SoftwaremlfSoftwaremlf
Softwaremlf
 
Informations Technology
Informations TechnologyInformations Technology
Informations Technology
 

Más de Lorie Jane Abao

Home networks by hamilton lara
Home networks by hamilton laraHome networks by hamilton lara
Home networks by hamilton lara
Lorie Jane Abao
 
Home networks by hamilton lara
Home networks by hamilton laraHome networks by hamilton lara
Home networks by hamilton lara
Lorie Jane Abao
 
Growing in generosity.pptx hamilton lara.pptx new
Growing in generosity.pptx hamilton lara.pptx newGrowing in generosity.pptx hamilton lara.pptx new
Growing in generosity.pptx hamilton lara.pptx new
Lorie Jane Abao
 
Growing in generosity.pptx hamilton lara
Growing in generosity.pptx hamilton laraGrowing in generosity.pptx hamilton lara
Growing in generosity.pptx hamilton lara
Lorie Jane Abao
 
Protect your good name hamilton lara
Protect your good name hamilton laraProtect your good name hamilton lara
Protect your good name hamilton lara
Lorie Jane Abao
 
Recycling of household waste hamilton lara
Recycling of household waste hamilton laraRecycling of household waste hamilton lara
Recycling of household waste hamilton lara
Lorie Jane Abao
 
It was a fun and messy adventure hamilton
It was a fun and messy adventure hamiltonIt was a fun and messy adventure hamilton
It was a fun and messy adventure hamilton
Lorie Jane Abao
 
Hamilton lara philippines
Hamilton lara philippinesHamilton lara philippines
Hamilton lara philippines
Lorie Jane Abao
 
Guevarra institute of technology hamilton lara
Guevarra institute of technology hamilton laraGuevarra institute of technology hamilton lara
Guevarra institute of technology hamilton lara
Lorie Jane Abao
 
Ice cream shop for sale hamilton lara
Ice cream shop for sale hamilton laraIce cream shop for sale hamilton lara
Ice cream shop for sale hamilton lara
Lorie Jane Abao
 
Give yourself some credit hamilton lara
Give yourself some credit hamilton laraGive yourself some credit hamilton lara
Give yourself some credit hamilton lara
Lorie Jane Abao
 
Hamilton lara give yourself some credit
Hamilton lara give yourself some creditHamilton lara give yourself some credit
Hamilton lara give yourself some credit
Lorie Jane Abao
 
Rent a cabin hamilton lara
Rent a cabin hamilton laraRent a cabin hamilton lara
Rent a cabin hamilton lara
Lorie Jane Abao
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
Lorie Jane Abao
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
Lorie Jane Abao
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
Lorie Jane Abao
 

Más de Lorie Jane Abao (20)

Home networks by hamilton lara
Home networks by hamilton laraHome networks by hamilton lara
Home networks by hamilton lara
 
Home networks by hamilton lara
Home networks by hamilton laraHome networks by hamilton lara
Home networks by hamilton lara
 
Growing in generosity.pptx hamilton lara.pptx new
Growing in generosity.pptx hamilton lara.pptx newGrowing in generosity.pptx hamilton lara.pptx new
Growing in generosity.pptx hamilton lara.pptx new
 
Growing in generosity.pptx hamilton lara
Growing in generosity.pptx hamilton laraGrowing in generosity.pptx hamilton lara
Growing in generosity.pptx hamilton lara
 
Hamilton lara 2011
Hamilton lara 2011Hamilton lara 2011
Hamilton lara 2011
 
Protect your good name hamilton lara
Protect your good name hamilton laraProtect your good name hamilton lara
Protect your good name hamilton lara
 
Recycling of household waste hamilton lara
Recycling of household waste hamilton laraRecycling of household waste hamilton lara
Recycling of household waste hamilton lara
 
It was a fun and messy adventure hamilton
It was a fun and messy adventure hamiltonIt was a fun and messy adventure hamilton
It was a fun and messy adventure hamilton
 
Hamilton lara kids bank
Hamilton lara kids bankHamilton lara kids bank
Hamilton lara kids bank
 
Hamliton
HamlitonHamliton
Hamliton
 
Hamliton
HamlitonHamliton
Hamliton
 
Hamilton lara philippines
Hamilton lara philippinesHamilton lara philippines
Hamilton lara philippines
 
Guevarra institute of technology hamilton lara
Guevarra institute of technology hamilton laraGuevarra institute of technology hamilton lara
Guevarra institute of technology hamilton lara
 
Ice cream shop for sale hamilton lara
Ice cream shop for sale hamilton laraIce cream shop for sale hamilton lara
Ice cream shop for sale hamilton lara
 
Give yourself some credit hamilton lara
Give yourself some credit hamilton laraGive yourself some credit hamilton lara
Give yourself some credit hamilton lara
 
Hamilton lara give yourself some credit
Hamilton lara give yourself some creditHamilton lara give yourself some credit
Hamilton lara give yourself some credit
 
Rent a cabin hamilton lara
Rent a cabin hamilton laraRent a cabin hamilton lara
Rent a cabin hamilton lara
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
 
Water, water, everywhere hamilton lara
Water, water, everywhere hamilton laraWater, water, everywhere hamilton lara
Water, water, everywhere hamilton lara
 

Último

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Último (20)

Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

Hamilton lara computer forensics specialist

  • 1. Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br /> Computer Forensics, also called digital Forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and network. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in year to come.<br /> A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and network. According to Shelly and Cashman (Computer Careers), may areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, willingness to learn and update skills, and a knack for problem solving.<br /> When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58)<br /> A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the pst, many computer forensics specialist were self-taught computer users. Today, extensive training usually from several different source, is required. A degree in Computer Science should be supplemented with graduate course and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55).<br /> With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited<br />Reinman, David P. “Fighting Cybercriminals.” Cybertech Monthly Febuary 2008: 52-58.<br />Shelly, Gary B., and Thomas J. Cashman. “Computer Careers. “Course Technology. 7 March 2008 <www.scsite.com/wd2007/pr2/wc.htm><br />Turell. Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company,2008.<br />