SlideShare a Scribd company logo
1 of 2
Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.<br />A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cashman (Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutor, military intelligence, insurance agencies, and information security department in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving.<br />When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58).<br />A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000(Turell 44-45).<br />With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialist to battle these crimes will increase for many years to come.<br />Work Cited<br />Reinman, David P. “Fighting Cybercriminals.” Cybertech Monthly February 2008: 52-58<br />Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008<br />www.scsited.com/wd2007/pr2/wc.htm.<br />Turell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company, 2008.<br />
Research paper -- neri

More Related Content

What's hot

Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)lord_durana
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1maranan_alexa
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)jeremargwapo
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2guest4ea1460
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Filesamiable_indian
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 

What's hot (20)

Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Jenevie
JenevieJenevie
Jenevie
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Lab 1
Lab 1Lab 1
Lab 1
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 
Hacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig ClarkHacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig Clark
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 

Viewers also liked

Prepositions of movement
Prepositions of movementPrepositions of movement
Prepositions of movementcenmar1120
 
Reading about curacao
Reading about curacaoReading about curacao
Reading about curacaodarwin9112
 
Victorian era games
Victorian era gamesVictorian era games
Victorian era gamesreidsta7771
 
Vocabulary kopya (2)
Vocabulary   kopya (2)Vocabulary   kopya (2)
Vocabulary kopya (2)ihsan
 
江老师 --试卷
江老师 --试卷江老师 --试卷
江老师 --试卷jasonkkp
 
Conditionals
ConditionalsConditionals
Conditionalsjckh4uiee
 
نافذه جوهارى واستخدامها للتطوير المؤسسى
نافذه جوهارى واستخدامها للتطوير المؤسسىنافذه جوهارى واستخدامها للتطوير المؤسسى
نافذه جوهارى واستخدامها للتطوير المؤسسىwaleed abdallah
 
Modals verbs 2
Modals verbs 2Modals verbs 2
Modals verbs 2urrozm
 
Как разговаривать, чтобы малыш заговорил на английском
Как разговаривать, чтобы малыш заговорил на английскомКак разговаривать, чтобы малыш заговорил на английском
Как разговаривать, чтобы малыш заговорил на английскомMarina Suzdaleva
 
5.4 dividing fractions updated
5.4 dividing fractions updated5.4 dividing fractions updated
5.4 dividing fractions updatedbweldon
 
Recycling of household waste ---- neri
Recycling of household waste  ---- neriRecycling of household waste  ---- neri
Recycling of household waste ---- neriaejay_neri
 
Grammer book 2
Grammer book 2Grammer book 2
Grammer book 2madicawood
 

Viewers also liked (20)

Prepositions of movement
Prepositions of movementPrepositions of movement
Prepositions of movement
 
Guide 1[1]
Guide 1[1]Guide 1[1]
Guide 1[1]
 
Reading about curacao
Reading about curacaoReading about curacao
Reading about curacao
 
Victorian era games
Victorian era gamesVictorian era games
Victorian era games
 
Vocabulary kopya (2)
Vocabulary   kopya (2)Vocabulary   kopya (2)
Vocabulary kopya (2)
 
江老师 --试卷
江老师 --试卷江老师 --试卷
江老师 --试卷
 
Conditionals
ConditionalsConditionals
Conditionals
 
Simple present
Simple presentSimple present
Simple present
 
نافذه جوهارى واستخدامها للتطوير المؤسسى
نافذه جوهارى واستخدامها للتطوير المؤسسىنافذه جوهارى واستخدامها للتطوير المؤسسى
نافذه جوهارى واستخدامها للتطوير المؤسسى
 
Class 5c d
Class 5c dClass 5c d
Class 5c d
 
Jobeasy
JobeasyJobeasy
Jobeasy
 
Passive voiceloreh
Passive voicelorehPassive voiceloreh
Passive voiceloreh
 
Modals verbs 2
Modals verbs 2Modals verbs 2
Modals verbs 2
 
It's sunny
It's sunnyIt's sunny
It's sunny
 
Как разговаривать, чтобы малыш заговорил на английском
Как разговаривать, чтобы малыш заговорил на английскомКак разговаривать, чтобы малыш заговорил на английском
Как разговаривать, чтобы малыш заговорил на английском
 
Partidos politicos
Partidos politicosPartidos politicos
Partidos politicos
 
Mi revista(diapositivas)
Mi revista(diapositivas)Mi revista(diapositivas)
Mi revista(diapositivas)
 
5.4 dividing fractions updated
5.4 dividing fractions updated5.4 dividing fractions updated
5.4 dividing fractions updated
 
Recycling of household waste ---- neri
Recycling of household waste  ---- neriRecycling of household waste  ---- neri
Recycling of household waste ---- neri
 
Grammer book 2
Grammer book 2Grammer book 2
Grammer book 2
 

Similar to Research paper -- neri

Kent philipneri
Kent philipneriKent philipneri
Kent philipnerikent neri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdfPrerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdfCCASTraining
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 

Similar to Research paper -- neri (14)

Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Forensics
ForensicsForensics
Forensics
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdfPrerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 

More from aejay_neri

Lab1 2 scissor's office supply ----neri sheet2 (1)
Lab1 2 scissor's office supply ----neri sheet2 (1)Lab1 2 scissor's office supply ----neri sheet2 (1)
Lab1 2 scissor's office supply ----neri sheet2 (1)aejay_neri
 
Lab1 1 konas expresso coffee sheet1
Lab1 1 konas expresso coffee sheet1Lab1 1 konas expresso coffee sheet1
Lab1 1 konas expresso coffee sheet1aejay_neri
 
Aejay .midterm
Aejay .midtermAejay .midterm
Aejay .midtermaejay_neri
 
Aejay.chap2.case 2
Aejay.chap2.case 2Aejay.chap2.case 2
Aejay.chap2.case 2aejay_neri
 
Aejay.chap2.case 2
Aejay.chap2.case 2Aejay.chap2.case 2
Aejay.chap2.case 2aejay_neri
 
E comstation --- nerii
E comstation  --- neriiE comstation  --- nerii
E comstation --- neriiaejay_neri
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neriaejay_neri
 
Home networks ----neri
Home networks  ----neriHome networks  ----neri
Home networks ----neriaejay_neri
 
Home networks neri
Home networks neriHome networks neri
Home networks neriaejay_neri
 
Growing in generosity ----neri
Growing in generosity  ----neriGrowing in generosity  ----neri
Growing in generosity ----neriaejay_neri
 
Healthy lifestyle --- neri
Healthy lifestyle  --- neriHealthy lifestyle  --- neri
Healthy lifestyle --- neriaejay_neri
 
Check it out --- neri
Check it out  --- neriCheck it out  --- neri
Check it out --- neriaejay_neri
 
Kiddies bank -- neri
Kiddies bank -- neriKiddies bank -- neri
Kiddies bank -- neriaejay_neri
 

More from aejay_neri (20)

Lab1 2 scissor's office supply ----neri sheet2 (1)
Lab1 2 scissor's office supply ----neri sheet2 (1)Lab1 2 scissor's office supply ----neri sheet2 (1)
Lab1 2 scissor's office supply ----neri sheet2 (1)
 
Lab1 1 konas expresso coffee sheet1
Lab1 1 konas expresso coffee sheet1Lab1 1 konas expresso coffee sheet1
Lab1 1 konas expresso coffee sheet1
 
Aejay .midterm
Aejay .midtermAejay .midterm
Aejay .midterm
 
Aejay.chap2.case 2
Aejay.chap2.case 2Aejay.chap2.case 2
Aejay.chap2.case 2
 
Aejay.chap2.case 2
Aejay.chap2.case 2Aejay.chap2.case 2
Aejay.chap2.case 2
 
Aejay (1)
Aejay (1)Aejay (1)
Aejay (1)
 
Neriii sheet1
Neriii sheet1Neriii sheet1
Neriii sheet1
 
Aj... report
Aj... reportAj... report
Aj... report
 
E comstation --- nerii
E comstation  --- neriiE comstation  --- nerii
E comstation --- nerii
 
Aj
AjAj
Aj
 
Aj.neri
Aj.neriAj.neri
Aj.neri
 
Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Home networks ----neri
Home networks  ----neriHome networks  ----neri
Home networks ----neri
 
Home networks neri
Home networks neriHome networks neri
Home networks neri
 
Growing in generosity ----neri
Growing in generosity  ----neriGrowing in generosity  ----neri
Growing in generosity ----neri
 
Ear - neri
Ear  - neriEar  - neri
Ear - neri
 
Healthy lifestyle --- neri
Healthy lifestyle  --- neriHealthy lifestyle  --- neri
Healthy lifestyle --- neri
 
Aejay
AejayAejay
Aejay
 
Check it out --- neri
Check it out  --- neriCheck it out  --- neri
Check it out --- neri
 
Kiddies bank -- neri
Kiddies bank -- neriKiddies bank -- neri
Kiddies bank -- neri
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Research paper -- neri

  • 1. Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.<br />A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cashman (Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutor, military intelligence, insurance agencies, and information security department in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving.<br />When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58).<br />A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000(Turell 44-45).<br />With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialist to battle these crimes will increase for many years to come.<br />Work Cited<br />Reinman, David P. “Fighting Cybercriminals.” Cybertech Monthly February 2008: 52-58<br />Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008<br />www.scsited.com/wd2007/pr2/wc.htm.<br />Turell, Marcia O., and Alex N. Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company, 2008.<br />