SlideShare a Scribd company logo
1 of 3
Hankins 1


        Mary Hankins

        Mr. Habib

        Business 102

        14 March 2008

                                       Computer Forensics Specialist

      Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly

growing field that involves gathering and analyzing evidence from computers and networks. Because

computers and the Internet are the fastest growing technology used for criminal activity, the need for

computer forensics specialist will increase in years to come.


      A computer forensics specialist examines computer media, programs, data, and log files on

computers, servers, and networks. According to Shelly and Cashman (Shelly)many areas employ

computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence,

insurance agencies, and information security departments in the private sector. A computer forensics

specialist must have knowledge of the law, technical experience with many types of hardware and

software products, superior communications skills, a willingness to learn and update skills, and a knack

for problem solving.


      When a problem occurs, it is the responsibility of the computer forensics specialist to carefully

take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer .

These steps include protecting the suspect’s computer, discovering all files, recovering deleted files,

revealing hidden files, accesing protected or encrypted files, analyzing all the data, and providing expert

consultation and/or testimony as required (Reinman 52-58).


      A computer forensics specialist must have knowledge of all aspects of the computer, from the
operating system to computer architecture and hardware design. In the past, many computer forensics
specialist were self-taught compter users. Today, extensive training, usually from several different
Hankins 2


      Sources, is required. A degree in Computer Science should be supplemented with graduate

courses and university-level professional development certificates. Entry level salaries range from

$45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55).


      With the growing use of computers in all areas of life, the number of computer crimes surely will

continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many

years to come.
Hankins 3


                                     Works Cited
Reinman, David p. "Fighting Cybercriminals." Cybertech Monthly 7 February 2008: 52-58.

Shelly, Gary b., and Thomas J. Cashman. Computer Careers. 7 March 2008.
<<www.scsite.com/wd2007/pr2/wc.htm>.>.

Turell, Marcia O, and Alex N. Gutierrez. "Cybercrimes and Criminals."El Paso: Legal Works
Publishing Company (2008): 44-55.

More Related Content

What's hot

Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)Masudur Rahman
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsSukanya Ben
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital FirmMohamad Fathi
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systemsOmid Aminzadeh Gohari
 

What's hot (20)

Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
Lab 1
Lab 1Lab 1
Lab 1
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Data Security
Data SecurityData Security
Data Security
 
chapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firmchapter 8- Management Information Systems Managing the Digital Firm
chapter 8- Management Information Systems Managing the Digital Firm
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 

Viewers also liked

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)kent neri
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)kent neri
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)kent neri
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2mehhhh
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakShelly Sanchez Terrell
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Viewers also liked (7)

Canaan cover letter (1)
Canaan cover letter (1)Canaan cover letter (1)
Canaan cover letter (1)
 
K ent philip neri (1st year high.)
K ent philip neri (1st year high.)K ent philip neri (1st year high.)
K ent philip neri (1st year high.)
 
Kent philip neri(1styear high.)
Kent philip neri(1styear high.)Kent philip neri(1styear high.)
Kent philip neri(1styear high.)
 
Gingoog city 2
Gingoog city 2Gingoog city 2
Gingoog city 2
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar to Kent philipneri

Similar to Kent philipneri (20)

Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Jenevie
JenevieJenevie
Jenevie
 
Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Hankins (merjo)
Hankins (merjo)Hankins (merjo)
Hankins (merjo)
 

More from kent neri

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1kent neri
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)kent neri
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)kent neri
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)kent neri
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)kent neri
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)kent neri
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lotkent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)kent neri
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)kent neri
 
Airplane rides
Airplane ridesAirplane rides
Airplane rideskent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)kent neri
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)kent neri
 
Autumn festival
Autumn festivalAutumn festival
Autumn festivalkent neri
 

More from kent neri (18)

Leading different personalities 1
Leading different personalities 1Leading different personalities 1
Leading different personalities 1
 
Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)Manny pacquiao fight with marquez(kent)
Manny pacquiao fight with marquez(kent)
 
Craft barn
Craft barnCraft barn
Craft barn
 
Working together(k entneri )
Working together(k entneri )Working together(k entneri )
Working together(k entneri )
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Working together(kent neri)
Working together(kent neri)Working together(kent neri)
Working together(kent neri)
 
Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)Our gingoog city(kent neri 99)
Our gingoog city(kent neri 99)
 
Shop for sale(kent neri)
Shop for sale(kent neri)Shop for sale(kent neri)
Shop for sale(kent neri)
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)Rent a cabin(kent neri 1 peace)
Rent a cabin(kent neri 1 peace)
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Craft barn (kent neri 1)
Craft barn (kent neri 1)Craft barn (kent neri 1)
Craft barn (kent neri 1)
 
Play ball
Play ballPlay ball
Play ball
 
Play ball
Play ballPlay ball
Play ball
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Kent philipneri

  • 1. Hankins 1 Mary Hankins Mr. Habib Business 102 14 March 2008  Computer Forensics Specialist Computer forensics, also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialist will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cashman (Shelly)many areas employ computer forensics specialist, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communications skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer . These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accesing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58). A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialist were self-taught compter users. Today, extensive training, usually from several different
  • 2. Hankins 2 Sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell 44-55). With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.
  • 3. Hankins 3 Works Cited Reinman, David p. "Fighting Cybercriminals." Cybertech Monthly 7 February 2008: 52-58. Shelly, Gary b., and Thomas J. Cashman. Computer Careers. 7 March 2008. <<www.scsite.com/wd2007/pr2/wc.htm>.>. Turell, Marcia O, and Alex N. Gutierrez. "Cybercrimes and Criminals."El Paso: Legal Works Publishing Company (2008): 44-55.