Who is the target audience for this book?
Make no mistake. This book is intended for computer professionals. If you have a degree in computer science or just know a lot about computers, you will not learn anything from this book. This book is for children in middle school age group, but it will also be a good introductory book for adults.
That said, what the book talks about?
What is the science of computer forensics?
Computer forensics is a two-part process. First, data is retrieved, then the data. It differs from other forensic science, because the data usually stands on its own and should not be interpreted.
What are the many duties of a technician computer forensics?
While doing their job, computer forensic specialists must keep the evidence, rather than introduce a virus or worm into the system, process the data correctly, keep the evidence in the chain of command, to reduce the impact of the analysis to be affected by the company, and see the inside information not disclosed.
Following these rules, a computer forensic experts found the hidden files, swap files and temp files used by the operating system and applications. They access these files and protected and encrypted files, searching for information relevant to this case. They analyzed the data found, especially in areas normally considered inaccessible. They perform all over the system of analysis and a list of all the relevant files. They provide an opinion of the appearance and who is the author of that file. They are trying to delete a note or file protection, and they provide the expertise and / or consultation in court if necessary.
book provides definitions for commonly used words or jargon of the industry.
hacker is someone who is really interested in a piece of technology and learning everything possible about the technology.
cracker is someone who uses his knowledge of the hacker is bad.
Hackers are white hat , and crackers are Black Hat hackers.
phreaker is the person who scammed the phone company to get free long-distance calls.
Spoof mimics the web site (or e-mail), so the receiver thinks the sender is someone else.
identity theft is trying to get information from people such as your accounts and passwords, and social security numbers.
Virus is a program, attached to another program, which infects the system when the program otvoren.Virus can not do anything unless the application is open and escaped.
worm is like a virus, but can be replicated without any other program that opens.
Trojan Horse is a program that wants to be different types of programs.
Denial of Service (DoS) is when a cracker tries to prevent the system from being accessible by normal users.
No comments:
Post a Comment