Education
Fact-checked

At WiseGEEK, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What Is a Computer Forensics Analyst?

Melissa Barrett
Melissa Barrett

By strict interpretation, a computer forensics analyst works within the legal system to find, examine, and prepare evidence on computer devices for use in civil and criminal proceedings. In practice, however, this definition has been expanded to include those individuals who establish and test computer security protocols for private organizations. Government agencies specializing in intelligence and terrorism may also employ these professionals.

The development of digital forensic science parallels the advent and rise in popularity of computerized devices. Unfortunately, innovative technology often creates equally innovative criminals. Often, the job of a computer forensics analyst is to find out how devices such as cell phones and computers are being used to commit crimes. They can then use this information to find the criminals and stop them.

A computer forensics analyst can analyze and recover data from a computer's hard drive.
A computer forensics analyst can analyze and recover data from a computer's hard drive.

In a focused investigation, a computer forensics analyst may be called upon to work with a specific device. In many cases, his or her job is to recover evidence from a private computer. This may involve retrieving deleted files from a hard drive. In other instances, an analyst might need to hack into a system that is protected by a password or decipher encrypted information.

In-depth knowledge of computer hardware is expected from a computer forensic analyst.
In-depth knowledge of computer hardware is expected from a computer forensic analyst.

Ironically, a computer forensics analyst can become more adept at bypassing computer security systems than most criminal hackers. These individuals are heavily recruited by both the government and private sector organizations. Counterintelligence agencies often use these analysts to discover weaknesses within their computer information networks that could exploited.

Private companies often hire computer forensics analysts to fight cyberterrorism on a smaller scale.
Private companies often hire computer forensics analysts to fight cyberterrorism on a smaller scale.

The majority of counterterrorism initiatives also include addressing the potential of cyberterrorism attacks. As most transportation, utility, and financial institutions rely heavily on computers for daily operations, a terrorist attack aimed at these networks could be devastating. A highly trained and trusted computer forensics analyst may be employed by counterterrorism agencies specifically to attempt to bypass the security measures of those organizations that are vital to national infrastructure. Any vulnerabilities that are discovered can be remedied.

Computer forensics is a specialty within the computer science field.
Computer forensics is a specialty within the computer science field.

Private companies often hire computer forensics analysts to fight cyberterrorism on a smaller scale. In these cases, these businesses often wish to assure the privacy of proprietary information, such as the details of manufacturing operations and financial records. This need is magnified in those organizations that keep records of consumer credit card information.

Obviously, in-depth knowledge of computer hardware and programming is expected from a computer forensic analyst. As computer forensics is a relatively new field, there is no industry standard for educational requirements in hiring. Generally, a bachelor's degree in computer science is the minimum requirement of most private organizations. In some instances, law enforcement agencies will accept an associate's degree in the field. This acceptance is frequently contingent on the completion of further specialized police training.

Discuss this Article

Post your comments
Login:
Forgot password?
Register:
    • A computer forensics analyst can analyze and recover data from a computer's hard drive.
      By: merydolla
      A computer forensics analyst can analyze and recover data from a computer's hard drive.
    • In-depth knowledge of computer hardware is expected from a computer forensic analyst.
      By: Nneirda
      In-depth knowledge of computer hardware is expected from a computer forensic analyst.
    • Private companies often hire computer forensics analysts to fight cyberterrorism on a smaller scale.
      By: Yeko Photo Studio
      Private companies often hire computer forensics analysts to fight cyberterrorism on a smaller scale.
    • Computer forensics is a specialty within the computer science field.
      By: diego cervo
      Computer forensics is a specialty within the computer science field.