Computer Forensics

Only available on StudyMode
  • Download(s) : 366
  • Published : April 17, 2012
Open Document
Text Preview
Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. Many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required. A computer forensics specialist must have knowledge of all aspects of computers, from the operating system to computer architecture and hardware design. There are three main areas of law related to computer security that affect computer forensics and those come from the fourth and fifth amendment, the U.S. federal rules of evidence and hearsay and finally the three U.S. statutory laws. Computer forensic specialists must be very careful when doing any type of investigation and be sure to follow the laws, if the laws are broken in any way they can be charged with a felony. In conclusion to sum up...
tracking img