back to top

Book Review: Computer Inquiry by Elizabeth Buchner

[ad_1]

Who is the target audience for this book?

Make no mistake. This book is not intended for computer professionals. If you have a degree in computer science or know a lot about computers, you will not learn anything from this book. This book is aimed at middle school age kids, but it will also be a good introductory book for adults.

However, what does the book speak about?

What is computer forensics?

Computer forensics is a two-part process. First, the data is retrieved and then the data is used. It is different from other forensic science because the data is usually self-contained and does not require interpretation.

What are the duties of many computer forensics technician?

While doing their job, computer forensics specialists must preserve evidence, not to introduce viruses or worms into a system, handle data correctly, keep evidence inside the chain of command, reduce the impact of system analysis on any of the affected companies, and make sure not to Disclosure of privileged information.

By following these rules, computer forensics specialists find hidden files, swap files, and temp files used by the operating system and applications. They access these protected and encrypted files, and search for information related to the case. They analyze existing data, especially in areas that are usually inaccessible. They perform most of all system analysis and list all related files. It provides an opinion on the system layout and who authored the files. They record attempts to delete or protect files, and they provide expert testimonies and / or court consultations as needed.

The book provides definitions of commonly used words, or terms, in industry.

a Pirates He is someone who is really interested in a piece of technology and he learns everything possible about this technology.

a Chips He is the one who uses hacker knowledge about bad.

Pirates she White hat , And crackers are Black hat Pirates.

a phreaker It was the person who scammed the phone company to get free long distance calls.

Plagiarism Emulates a website (or email) so the recipient believes that the sender is someone else.

Deception It tries to get information from people, such as user accounts, passwords and social security numbers.

a virus It is a program, attached to another program, that infects the system when opening the program. The virus cannot do anything unless the program is opened and run.

a worm Similar to a virus, but it can be identical to itself without opening other programs.

a Trojans It is a program that claims to be a different kind of program.

Denial of service (DoS) when the cracker tries to prevent the system from reaching ordinary users.

[ad_2]&

More post

How to Change WordPress SMPT To Gmail or Google Work Space

Let's learn How to Change WordPress SMPT To Gmail or Google Work Space. This guide provide step by step tutorial on how to acomplish...
Newslodge front page

Newslodge

Newslodge - What they said in there about company "Newslodge.com.ng, we believe in the power of information to transform lives. We are not just a...

Gospelmetrics

Gospelmetrics - What they said in there about company "Welcome to Gospelmetrics, where we bring the light of the Gospel to your fingertips! We're thrilled...