logo
g Text Version
Beauty & Self
Books & Music
Career
Computers
Education
Family
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
Money
News & Politics
Relationships
Religion & Spirituality
Sports
Travel & Culture
TV & Movies

dailyclick
Bored? Games!
Nutrition
Postcards
Take a Quiz
Rate My Photo

new
Reading
Women's Fashion
Small Office/Home Office
History
Tennis
Holiday/Seasonal Cooking
Crafts for Kids


dailyclick
All times in EST

Low Carb: 8:00 PM

Full Schedule
g
g Computer Careers Site

BellaOnline's Computer Careers Editor

g

Rise to the Challenge of Computer Forensics


Magnifying glass over digital clues Cyber crime is on the rise. The Internet and social media channels expose the unwary to offers for non-existent cars, alluring ads for lonely hearts or financial deals that border on extortion. The Internet Crime Complaint Center operated by the USA's Federal Bureau of Investigation receive claims worldwide. There were over 260,000 filings in 2014 alone. The variety and frequency of fraudulent activities will only increase with time.

The emergence of the social web has affected citizen rights and privacy laws exposing the need for cyber forensics closer to home. Local police now investigate cases of web confidence scams and cyber bullying and shaming. With the integration of the Internet into essential services and the growing technical proficiency by criminals, electronic warfare can be carried out on any company or institution via coordinated denial of service attacks or infiltrated by way of an innocent-looking email with a malicious link.

A new computer career speciality arose to combat digital-related crimes. Computer forensics experts employ their legal knowledge, deductive reasoning and technical skills to find and identify data and resources which could serve as legal evidence. The job titles vary but the basic positions include:

Computer Forensics Technician
Computer Forensics Examiner
Computer Hacking Forensic Investigator
Cyber Security Forensic Analyst
Information Security Manager

Enter the Computer Forensics Experts

A computer forensics technician does physical, hands-on recovery of digital media such as computers, hard drives, servers, media players, cellular phones, flash drives, smart phones, game consoles, digital video records, DVDs, CDs and any other kind of digital media that may hold data critical to an investigation. They often need to disassemble machines to get to the essential hardware. They use specialized tools and software to retrieve all available data which can be used for further analysis.

A forensics examiner or analyst sifts through the data collected by a technician. The analyst looks for how and why data is pertinent to a case. For example, an analyst may examine a series of emails and from their content deduce that a specific email proves criminal intent or harm. The examiner then records and communicates his or her findings to the law enforcement or security officer in charge of the investigation. Communication skills are vital as it is often the forensics examiner who liaisons with the authorities handling a case.

An investigator with specialized knowledge of hacking methods may be utilized to gain access to encrypted data or to digitally trace evidence to its original creator or source. A hacker investigator must ensure that the results of his or her investigation is admissible in a court of law.

While most computer forensics positions are in law enforcement, military and government institutions, there is a growing need for the position in corporate and academic circles. Information security managers and cyber security analysts are employed to identify threats to internal systems and networks within universities and companies, big and small. They work to improve network hardware and software protections against an ever-changing roster of electronic intrusion and attacks as well as unauthorized internal access.

Becoming an Expert

For the last decade, digital forensics personnel have transitioned from jobs in law enforcement or the military. To their existing knowledge and experience of the justice system was added networking, hardware and software development skills. A handful of commercial vendors created certifications specific to the installation and use of their own products.

Because of the paramount requirement of encompassing all digital forensics within a legal framework, the discipline is neither purely technological or wholly based on the law. Only in recent years have universities recognized this field as distinct from computer science or information technology. Universities worldwide now offer associates, bachelors and graduate degrees.

Certifications in escalating expertise are offered by vendors and independent accreditation bodies. Testing may be carried out on-site or proctored at approved locations. Certifications must be renewed within a specified number of years. Among online job sites the most sought after certifications are:

GCFA: Global Information Assurance Certification (GIAC) Certified Forensic Analyst
GCFE: GIAC Certified Forensics Examiner
EnCE: EnCase Certified Examiner
CSFA: CyberSecurity Forensic Analyst

A Career for the Curious and Dedicated

The investigative field (includes digital forensics and private investigation) is expected to grow 20% through 2020. Digital forensics is finding its niche in more and more places. Those thinking of transitioning from software development, network administration, law enforcement or the military may find computer forensics a good second career. Bear in mind that extensive background and criminal checks are standard in the employment process for this position.

Cyber security and computer forensics are relatively new fields but the job has depth and challenge. While forensic personnel are rarely involved in day to day law enforcement, the demands of the job are high as the innocence or guilt of an individual may be decided based on the gathered evidence. As with most technical fields, there is the element of constant learning as technology and cyber crimes evolve.

Computer forensics is a computer career guaranteed to satisfy your inner Sherlock Holmes or Miss Marple. For that alone it's worth exploring.
Add Rise+to+the+Challenge+of+Computer+Forensics to Twitter Add Rise+to+the+Challenge+of+Computer+Forensics to Facebook Add Rise+to+the+Challenge+of+Computer+Forensics to MySpace Add Rise+to+the+Challenge+of+Computer+Forensics to Del.icio.us Digg Rise+to+the+Challenge+of+Computer+Forensics Add Rise+to+the+Challenge+of+Computer+Forensics to Yahoo My Web Add Rise+to+the+Challenge+of+Computer+Forensics to Google Bookmarks Add Rise+to+the+Challenge+of+Computer+Forensics to Stumbleupon Add Rise+to+the+Challenge+of+Computer+Forensics to Reddit




RSS | Related Articles | Editor's Picks Articles | Top Ten Articles | Previous Features | Site Map


For FREE email updates, subscribe to the Computer Careers Newsletter


Past Issues


print
Printer Friendly
bookmark
Bookmark
tell friend
Tell a Friend
forum
Forum
email
Email Editor


Content copyright © 2015 by Maria S. Cuasay. All rights reserved.
This content was written by Maria S. Cuasay. If you wish to use this content in any manner, you need written permission. Contact Maria S. Cuasay for details.

g


g features
Becoming A Marketing Technologist and CMTO

What Is Cloud Computing

Technical Writing Makes Information Easy To Digest

Archives | Site Map

forum
Forum
email
Contact

Past Issues
memberscenter


vote
Poetry
Daily
Weekly
Monthly
Less than Monthly



BellaOnline on Facebook
g


| About BellaOnline | Privacy Policy | Advertising | Become an Editor |
Website copyright © 2015 Minerva WebWorks LLC. All rights reserved.


BellaOnline Editor