Home » Security Training and Tips » Why Hacking Forensics Has Become Valuable Today

Why Hacking Forensics Has Become Valuable Today

In March 2012, six hackers in the US and abroad, who identified themselves as members of the notorious computer hacker group “Anonymous,” were charged with computer hacking and other related crimes, which have affected more than one million people. Cyber-attacks initiated by these hackers included breaking into computer systems, stealing confidential information and publicly disclosing them, hijacking the e-mail and Twitter accounts of people, and defacing Internet websites.

One of the six hackers is charged with stealing confidential information from over 800,000 clients and subscribers of Stratfor, a private firm which provides governments with independent geopolitical analysis. Other hackers are said to be responsible for denial of service (DoS) attacks against the websites of PayPal, Visa, and MasterCard, as well as foreign government computer systems. In addition, the hackers allegedly conspired to hack the website of a political party in Ireland, computer systems of HBGary, Inc. and its affiliate HBGary Federal, LLC, and even that of Fox Broadcasting Company, which included stealing the confidential data of more than 70,000 potential contestants on “X-Factor,” one of Fox‘s TV shows. In retaliation to what they perceived as unfavorable news coverage on “Frontline,” a news program, these hackers stole confidential data of 100,000 users of Sony’s website and 200,000 users of Bethesda Softworks’ website.

What is Hacking Forensics?

Recognizing the serious threat posed by hacking, hacking forensics has been developed to focus on network security investigations and determine evidence of computer crimes or misuses.

People aspiring to become Computer Hacking Forensic Investigators (CHFIs) must take and pass the CHFI exam (EC0 312-49) for them to be issued a professional certification by the International Council of E-Commerce Consultants. CHFIs are trained to discover and retrieve data in a computer system, which may be used as potential legal evidence, although said data may have been deleted, encrypted, or damaged.

Ashford Global IT (AGIT), a worldwide organization that specializes in IT and security courses, offers a CHFI training course wherein enrollees will learn how to follow and decipher the technological footprints of hackers and penetrators of a network and provide evidence to lead to prosecution.

Tags: , , , , ,

About this author:


Mary is a leading trainer in Microsoft® and Business Applications.

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.