Tyreano.com

The inventions you need.

Business

Book Review: Computer Research by Elizabeth Bauchner

Who is the target audience for this book?

Not make mistakes. This book is not intended for computer professionals. If you have a degree in Computer Science or just know a lot about computers, you won’t learn anything from this book. This book is geared toward middle school age children, but it would make a good introductory book for adults as well.

That said, what is the book about?

What is the science of computer forensics?

Computer forensics is a two-part process. Data is first retrieved and then used. It differs from other forensic sciences because the data is usually independent and does not need to be interpreted.

What are the many duties of a computer forensics technician?

While doing their jobs, computer forensics specialists must preserve evidence, not introduce viruses or worms into a system, handle data properly, keep evidence within the chain of command, reduce the impact of system analysis on affected businesses and ensure that inside information is not disclosed.

By following those rules, computer forensics professionals find hidden files, swap files, and temporary files used by the operating system and applications. They access these protected and encrypted files and archives, looking for information relevant to the case. They analyze the data found, especially in areas that are normally considered inaccessible. They perform a general system scan and list all relevant files. They provide an opinion on the design of the system and who created which files. They take notes of attempts to delete or protect files and provide expert testimony and/or court consultation as needed.

The book provides definitions of commonly used words, or jargon, in the industry.

HAS hacker it is someone who is really interested in a piece of technology and learns as much as possible about the technology.

HAS fissure he is someone who uses his hacker knowledge to do evil.

hackers are White hatand the cookies are black hat hackers

HAS phreaker was a person who scammed the phone company to get free long distance calls.

identity fraud you’re spoofing a website (or an email) so that the recipient thinks the sender is someone else.

Identity fraud is trying to obtain information from people, such as their user accounts and passwords, and social security numbers.

HAS virus it is a program, attached to another program, that infects a system when the program is opened. The virus can’t do anything unless the program is opened and running.

HAS worm it is like a virus, but it can replicate itself without other programs being opened.

HAS Troy Horse is a program that pretends to be a different kind of program.

denial of service (DoS) is when a cracker tries to prevent normal users from accessing a system.

LEAVE A RESPONSE

Your email address will not be published. Required fields are marked *