Categories: News

Book Review: Computer Investigation by Elizabeth Bauchner

Who is the target audience for this book?

Make no mistake. This book is not targeted for computer professionals. If you have a degree in Computer Science or just know a lot about computers, you won’t learn anything from this book. This book is targeted to children in the middle school age group, but it would also be a good introductory book for adults.

That said, what does the book talk about?

What is the science of computer forensics?

Computer forensics is a two-part process. First, data is retrieved and then the data is used. It is different from other forensic sciences because the data usually stands on its own and does not need to be interpreted.

What are the many duties of a computer forensics technician?

While doing their job, computer forensic specialists must preserve evidence, not introduce viruses or worms into a system, handle data properly, keep evidence within the chain of command, reduce the impact of the system’s analysis on any businesses affected, and make sure privileged information is not divulged.

Following those rules, computer forensic professionals find hidden files, swap files, and temp files used by the operating system and by applications. They access these files and protected and encrypted files, searching for information relevant to the case. They analyze the data found, especially in areas normally considered inaccessible. They perform an over all system analysis and list all relevant files. They provide an opinion of the system’s layout and who authored which files. They make notes of attempts to delete or protect files, and they provide expert testimony and/or consultation in court as needed.

The book gives definitions for commonly used words, or jargon, in the industry.

A hacker is someone who is really interested in a piece of technology and learns all possible about the technology.

A cracker is someone who uses their hacker knowledge for bad.

Hackers are white hat, and crackers are black hat hackers.

A phreaker was a person who scammed the telephone company to get free long-distance calls.

Spoofing is mimicking a website (or an email) so the receiver thinks the sender is someone else.

Phishing is trying to get information from people, like their user accounts and passwords, and social security numbers.

A virus is a program, attached to another program, that infects a system when the program is opened. The virus can’t do anything unless the program is opened and ran.

A worm is like a virus, but it can replicate itself without other programs being opened.

A Trojan horse is a program that pretends to be a different kind of program.

Denial of Service (DoS) is when a cracker tries to prevent a system from being accessible by its normal users.

techfeatured

Recent Posts

Why Document Shredding is Essential for Businesses

Key Takeaways Understand the importance of document shredding for data protection. Explore cost-effective and compliant…

20 hours ago

Innovative Strategies for Basement Waterproofing Success

Key Takeaways Basement waterproofing involves multiple strategies for long-term success. Proper drainage and sealing are…

20 hours ago

Revolutionizing Food Display Solutions: Innovative Approaches for the Modern Era

Table of Contents Understanding the Basics of Food Display Latest Trends in Food Display Solutions…

20 hours ago

How Technology is Reshaping Healthcare: A Journey Towards Better Patient Care

Key Takeaways Technology is rapidly transforming the healthcare industry. Benefits include improved patient outcomes, increased…

5 days ago

Innovative Strategies for Efficient Log Book Management in Trucking

Key Takeaways Understand the importance of efficient log book management for truck drivers. Explore the…

3 weeks ago

Best Crypto to Buy Now: Cryptocurrencies with the Most Potential in 2025

2025 is shaping up to be a monumental year for the cryptocurrency market. With Bitcoin…

3 weeks ago