g Text Version
Beauty & Self
Books & Music
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
News & Politics
Religion & Spirituality
Travel & Culture
TV & Movies

Bored? Games!
Take a Quiz
Rate My Photo

Natural Living
Folklore and Mythology
Distance Learning

All times in EST

Low Carb: 8:00 PM

Full Schedule
g Computer Careers Site

BellaOnline's Computer Careers Editor


Rise to the Challenge of Computer Forensics

Guest Author - Maria S. Cuasay

Magnifying glass over digital clues Cyber crime is on the rise. The Internet and social media channels expose the unwary to offers for non-existent cars, alluring ads for lonely hearts or financial deals that border on extortion. The Internet Crime Complaint Center operated by the USA's Federal Bureau of Investigation receive claims worldwide. There were over 260,000 filings in 2014 alone. The variety and frequency of fraudulent activities will only increase with time.

The emergence of the social web has affected citizen rights and privacy laws exposing the need for cyber forensics closer to home. Local police now investigate cases of web confidence scams and cyber bullying and shaming. With the integration of the Internet into essential services and the growing technical proficiency by criminals, electronic warfare can be carried out on any company or institution via coordinated denial of service attacks or infiltrated by way of an innocent-looking email with a malicious link.

A new computer career speciality arose to combat digital-related crimes. Computer forensics experts employ their legal knowledge, deductive reasoning and technical skills to find and identify data and resources which could serve as legal evidence. The job titles vary but the basic positions include:

Computer Forensics Technician
Computer Forensics Examiner
Computer Hacking Forensic Investigator
Cyber Security Forensic Analyst
Information Security Manager

Enter the Computer Forensics Experts

A computer forensics technician does physical, hands-on recovery of digital media such as computers, hard drives, servers, media players, cellular phones, flash drives, smart phones, game consoles, digital video records, DVDs, CDs and any other kind of digital media that may hold data critical to an investigation. They often need to disassemble machines to get to the essential hardware. They use specialized tools and software to retrieve all available data which can be used for further analysis.

A forensics examiner or analyst sifts through the data collected by a technician. The analyst looks for how and why data is pertinent to a case. For example, an analyst may examine a series of emails and from their content deduce that a specific email proves criminal intent or harm. The examiner then records and communicates his or her findings to the law enforcement or security officer in charge of the investigation. Communication skills are vital as it is often the forensics examiner who liaisons with the authorities handling a case.

An investigator with specialized knowledge of hacking methods may be utilized to gain access to encrypted data or to digitally trace evidence to its original creator or source. A hacker investigator must ensure that the results of his or her investigation is admissible in a court of law.

While most computer forensics positions are in law enforcement, military and government institutions, there is a growing need for the position in corporate and academic circles. Information security managers and cyber security analysts are employed to identify threats to internal systems and networks within universities and companies, big and small. They work to improve network hardware and software protections against an ever-changing roster of electronic intrusion and attacks as well as unauthorized internal access.

Becoming an Expert

For the last decade, digital forensics personnel have transitioned from jobs in law enforcement or the military. To their existing knowledge and experience of the justice system was added networking, hardware and software development skills. A handful of commercial vendors created certifications specific to the installation and use of their own products.

Because of the paramount requirement of encompassing all digital forensics within a legal framework, the discipline is neither purely technological or wholly based on the law. Only in recent years have universities recognized this field as distinct from computer science or information technology. Universities worldwide now offer associates, bachelors and graduate degrees.

Certifications in escalating expertise are offered by vendors and independent accreditation bodies. Testing may be carried out on-site or proctored at approved locations. Certifications must be renewed within a specified number of years. Among online job sites the most sought after certifications are:

GCFA: Global Information Assurance Certification (GIAC) Certified Forensic Analyst
GCFE: GIAC Certified Forensics Examiner
EnCE: EnCase Certified Examiner
CSFA: CyberSecurity Forensic Analyst

A Career for the Curious and Dedicated

The investigative field (includes digital forensics and private investigation) is expected to grow 20% through 2020. Digital forensics is finding its niche in more and more places. Those thinking of transitioning from software development, network administration, law enforcement or the military may find computer forensics a good second career. Bear in mind that extensive background and criminal checks are standard in the employment process for this position.

Cyber security and computer forensics are relatively new fields but the job has depth and challenge. While forensic personnel are rarely involved in day to day law enforcement, the demands of the job are high as the innocence or guilt of an individual may be decided based on the gathered evidence. As with most technical fields, there is the element of constant learning as technology and cyber crimes evolve.

Computer forensics is a computer career guaranteed to satisfy your inner Sherlock Holmes or Miss Marple. For that alone it's worth exploring.
This site needs an editor - click to learn more!

Add Rise+to+the+Challenge+of+Computer+Forensics to Twitter Add Rise+to+the+Challenge+of+Computer+Forensics to Facebook Add Rise+to+the+Challenge+of+Computer+Forensics to MySpace Add Rise+to+the+Challenge+of+Computer+Forensics to Digg Rise+to+the+Challenge+of+Computer+Forensics Add Rise+to+the+Challenge+of+Computer+Forensics to Yahoo My Web Add Rise+to+the+Challenge+of+Computer+Forensics to Google Bookmarks Add Rise+to+the+Challenge+of+Computer+Forensics to Stumbleupon Add Rise+to+the+Challenge+of+Computer+Forensics to Reddit

RSS | Related Articles | Editor's Picks Articles | Top Ten Articles | Previous Features | Site Map

For FREE email updates, subscribe to the Computer Careers Newsletter

Past Issues

Printer Friendly
tell friend
Tell a Friend
Email Editor

Content copyright © 2018 by Maria S. Cuasay. All rights reserved.
This content was written by Maria S. Cuasay. If you wish to use this content in any manner, you need written permission. Contact BellaOnline Administration for details.


g features
Becoming A Marketing Technologist and CMTO

What Is Cloud Computing

Technical Writing Makes Information Easy To Digest

Archives | Site Map


Past Issues

Note: BellaOnline uses cookies to help provide a consistent user experience. Our advertisers may use cookies to help customize ads. Please contact us with any question about our cookie use.

Summertime Foods
Corn on the Cob
Burgers on the Grill
Apple Pie


| About BellaOnline | Privacy Policy | Advertising | Become an Editor |
Website copyright © 2018 Minerva WebWorks LLC. All rights reserved.

BellaOnline Editor