• Latest
  • All
  • News
  • Business

Book Review: Computer Investigation by Elizabeth Bauchner

Aug 26, 2017
How are Slots & Other Online Casino Games Programmed?

Slot Selection: Choose The Game That Applies Best To Your Interests

Mar 17, 2023
Five Top Tips On How To Choose The Best Gaming Headset

Five Top Tips On How To Choose The Best Gaming Headset

Mar 17, 2023
A Guide On How To Choose The Best Gaming Mouse

A Guide On How To Choose The Best Gaming Mouse

Mar 17, 2023
Buying A Gaming Monitor: What You Should Look For Before Choosing The One To Buy

Buying A Gaming Monitor: What You Should Look For Before Choosing The One To Buy

Mar 17, 2023
A Step-by-Step Guide on How to Get Your CleanMyMacX Activation Number

Different Factors To Consider When You Want To Choose A Keyboard For Gaming

Mar 17, 2023
10 games that are designed to keep you engaged

Useful Tips for Choosing Your New Gaming Chair

Mar 17, 2023
Discovery Phase For Software Development: How Much Does It Cost?

The 3 Main Reasons To Identify Security Problems in Software Code

Mar 15, 2023
The Evolution Of Air Conditioning Technology And Its Impact on the Way We Live And Consume

The Evolution Of Air Conditioning Technology And Its Impact on the Way We Live And Consume

Mar 14, 2023
What You Should Know About The Maker Protocol: A Comprehensive Guide

What You Should Know About The Maker Protocol: A Comprehensive Guide

Mar 14, 2023
Tableau Developer Career Path in 2023

Tableau Developer Career Path in 2023

Mar 13, 2023
5 Best Data Security Practices

Digital transformation trends businesses need to watch in 2023

Mar 13, 2023
The Biggest Innovations in Business Communication Technology

How to Leverage the Power of Intelligent Leadership

Feb 23, 2023
  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy
Saturday, March 18, 2023
Tech Featured
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips
No Result
View All Result
No Result
View All Result
Tech Featured
No Result
View All Result
Home News

Book Review: Computer Investigation by Elizabeth Bauchner

by techfeatured
Aug 26, 2017
in News
0
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

Who is the target audience for this book?

Make no mistake. This book is not targeted for computer professionals. If you have a degree in Computer Science or just know a lot about computers, you won’t learn anything from this book. This book is targeted to children in the middle school age group, but it would also be a good introductory book for adults.

That said, what does the book talk about?

What is the science of computer forensics?

Computer forensics is a two-part process. First, data is retrieved and then the data is used. It is different from other forensic sciences because the data usually stands on its own and does not need to be interpreted.

What are the many duties of a computer forensics technician?

While doing their job, computer forensic specialists must preserve evidence, not introduce viruses or worms into a system, handle data properly, keep evidence within the chain of command, reduce the impact of the system’s analysis on any businesses affected, and make sure privileged information is not divulged.

Following those rules, computer forensic professionals find hidden files, swap files, and temp files used by the operating system and by applications. They access these files and protected and encrypted files, searching for information relevant to the case. They analyze the data found, especially in areas normally considered inaccessible. They perform an over all system analysis and list all relevant files. They provide an opinion of the system’s layout and who authored which files. They make notes of attempts to delete or protect files, and they provide expert testimony and/or consultation in court as needed.

The book gives definitions for commonly used words, or jargon, in the industry.

A hacker is someone who is really interested in a piece of technology and learns all possible about the technology.

A cracker is someone who uses their hacker knowledge for bad.

Hackers are white hat, and crackers are black hat hackers.

A phreaker was a person who scammed the telephone company to get free long-distance calls.

Spoofing is mimicking a website (or an email) so the receiver thinks the sender is someone else.

Phishing is trying to get information from people, like their user accounts and passwords, and social security numbers.

A virus is a program, attached to another program, that infects a system when the program is opened. The virus can’t do anything unless the program is opened and ran.

A worm is like a virus, but it can replicate itself without other programs being opened.

A Trojan horse is a program that pretends to be a different kind of program.

Denial of Service (DoS) is when a cracker tries to prevent a system from being accessible by its normal users.

Tags: androidimaciphonemacbooktechnology news
ShareTweetShareSendShare

For any queries, you can reach us at [email protected]

Latest Posts

  • Slot Selection: Choose The Game That Applies Best To Your Interests
  • Five Top Tips On How To Choose The Best Gaming Headset
  • A Guide On How To Choose The Best Gaming Mouse
  • Buying A Gaming Monitor: What You Should Look For Before Choosing The One To Buy
  • Different Factors To Consider When You Want To Choose A Keyboard For Gaming
Tech Featured

© 2022. All Rights Reserved.

Navigate Site

  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy

Follow Us

No Result
View All Result
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips

© 2022. All Rights Reserved.