Celaunds.com

Tech which makes Sense

Who is the target audience for this book?

Not make mistakes. This book is not intended for computer professionals. If you have a computer science degree or you just know a lot about computers, you won’t learn anything from this book. This book is intended for children of middle school age, but it would also make a good introductory book for adults.

That said, what is the book talking about?

What is computer science forensics?

Computer forensics is a two-part process. First, the data is retrieved and then the data is used. It is different from other forensic sciences because the data is generally independent and does not need to be interpreted.

What are the many functions of a computer forensic technician?

While performing their work, IT forensic specialists must preserve evidence, not introduce viruses or worms into a system, handle data correctly, keep evidence within the chain of command, reduce the impact of system analysis on affected companies and ensure that inside information is not disclosed.

By following those rules, computer forensics professionals find hidden files, swap files, and temporary files used by the operating system and applications. They access these protected and encrypted files and archives, looking for relevant information for the case. They analyze the data found, especially in areas normally considered inaccessible. They perform a general scan of the system and list all relevant files. They provide an opinion on the design of the system and who is the author of which files. They take notes of attempts to delete or protect files and provide expert testimony and / or court consultation as necessary.

The book offers definitions of words or jargon commonly used in the industry.

TO hacker is someone who is really interested in a piece of technology and learns as much as possible about the technology.

TO cracker He is someone who uses his hacker knowledge for evil.

Hackers is it so White hatand the cookies are black hat hackers.

TO phreaker It was a person who scammed the phone company to get free long distance calls.

Spoofing you’re mimicking a website (or email), so the recipient thinks the sender is someone else.

Identity fraud you are trying to get information from people, such as their user accounts and passwords, and social security numbers.

TO virus it is a program, attached to another program, that infects a system when the program is opened. The virus cannot do anything unless the program is opened and run.

TO worm It is like a virus, but it can replicate itself without other programs being opened.

TO Troy Horse it is a program that is intended to be a different type of program.

Denial of service (DoS) is when a hacker tries to prevent a system from being accessible by its normal users.

Leave a Reply

Your email address will not be published. Required fields are marked *