Relationship

Book Review: Computer Research by Elizabeth Bauchner

Who is the target audience for this book?

Not make mistakes. This book is not intended for computer professionals. If you have a degree in Computer Science or just know a lot about computers, you won’t learn anything from this book. This book is intended for middle school age children, but would also make a good introductory book for adults.

That being said, what is the book about?

What is the science of computer forensics?

Computer forensics is a two-part process. First, the data is retrieved and then used. It differs from other forensic sciences because the data is usually independent and does not need to be interpreted.

What are the many duties of a computer forensic technician?

While doing their job, computer forensics specialists must preserve evidence, not introduce viruses or worms into a system, handle data correctly, keep evidence within the chain of command, reduce the impact of system analysis on affected businesses and make sure that inside information is not disclosed.

By following those rules, computer forensics professionals find hidden files, swap files, and temporary files used by the operating system and applications. They access these protected and encrypted files and files, looking for information relevant to the case. They analyze the data found, especially in areas that are normally considered inaccessible. They perform a general system scan and list all relevant files. They provide an opinion on the design of the system and who created which files. They take notes of attempts to delete or protect files and provide expert testimony and/or court consultation as necessary.

The book provides definitions of commonly used words, or jargon, in the industry.

IN hacker is someone who is really interested in a piece of technology and learns as much about the technology as possible.

IN crack is someone who uses his hacker knowledge to do evil.

hackers are White hatand the cookies are black hat hackers

IN phreaker was a person who scammed the phone company to get free long distance calls.

identity fraud you are imitating a website (or an email) so that the receiver thinks the sender is someone else.

Identity fraud is trying to get information from people, such as their user accounts and passwords, and social security numbers.

IN virus is a program, attached to another program, that infects a system when the program is opened. The virus can’t do anything unless the program is opened and run.

IN worm It’s like a virus, but it can replicate without other programs opening.

IN Troy Horse is a program that pretends to be a different type of program.

denial of service (DoS) is when a cracker attempts to prevent normal users from accessing a system.

Leave a Reply

Your email address will not be published. Required fields are marked *