SlideShare a Scribd company logo
Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br />               Computer forensics also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.<br />              A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to (Shelly and Cashman)(Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. Computer forensics specialists must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and updates skills, and a knack for problem solving.<br />              When a problem occurs, it is the responsibility of the computer forensics specialists to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and /or testimony as required (Reinman 52-58)<br />              A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry-level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell and Gutierrez 44-45)<br />              With the growing use of computers in all areas of life, the number of computer crime surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited BIBLIOGRAPHY Reinman, David P. quot;
Fighting Cybercriminals.quot;
 Cybertech Monthly February 2008: 52-58.Shelly, Gary B. and Thomas J. Cashman. quot;
Computer Careers.quot;
 Course Technology 7 March 2008:  <www.scsite.com/wd2007/pr2/wc.htm>.Turell, Marcia O. and Alex N. Gutierrez. Cybercrimes and Criminals El Paso: Legal Works Publishing Company 2008: 44-45.<br />
Cataluña computer forensics specialist
Cataluña computer forensics specialist

More Related Content

What's hot

Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
lord_durana
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
richbryansalvo
 
Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
mj tanasas
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
Elma Valdehueza
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
zamayla143
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
ricky098
 
Lab 1
Lab 1Lab 1
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
}{it -Boy
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
Enriquee Guevarra
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
maranan_alexa
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
jeremargwapo
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
heidirobison
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
guest4ea1460
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
dentpress
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
Shiva Bissessar
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
amiable_indian
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
Shiva Bissessar
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru
 

What's hot (18)

Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Hankins by {bryan23}
Hankins by {bryan23}Hankins by {bryan23}
Hankins by {bryan23}
 
Mjtanasas2
Mjtanasas2Mjtanasas2
Mjtanasas2
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Lab 1
Lab 1Lab 1
Lab 1
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)Hankins 1 (Ej Guevarra)
Hankins 1 (Ej Guevarra)
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
 
(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)(kevin 09) chap.2 lab 1 kvin(1)
(kevin 09) chap.2 lab 1 kvin(1)
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer Forensics Specialist Lab 1 From Word Chapter 2
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Teaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence FilesTeaching Computer Forensics Using Student Developed Evidence Files
Teaching Computer Forensics Using Student Developed Evidence Files
 
Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 

Viewers also liked

Cataluña lab 2
Cataluña lab 2Cataluña lab 2
Cataluña lab 2
Jennifer Cataluña
 
Cataluña financial intutions
Cataluña financial intutionsCataluña financial intutions
Cataluña financial intutions
Jennifer Cataluña
 
Cataluña lab 1
Cataluña lab 1Cataluña lab 1
Cataluña lab 1
Jennifer Cataluña
 
cataluna
catalunacataluna
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
Jennifer Cataluña
 
Give yourself some credit cataluña
Give yourself  some credit cataluñaGive yourself  some credit cataluña
Give yourself some credit cataluña
Jennifer Cataluña
 
Cataluña jennifer protect your good name
Cataluña jennifer  protect your good nameCataluña jennifer  protect your good name
Cataluña jennifer protect your good name
Jennifer Cataluña
 
Protect your good name
Protect your good nameProtect your good name
Protect your good name
Jennifer Cataluña
 
Эксклюзивный дизайн Kronenbourg от Лакруа
Эксклюзивный дизайн Kronenbourg от ЛакруаЭксклюзивный дизайн Kronenbourg от Лакруа
Эксклюзивный дизайн Kronenbourg от Лакруаgyerrero
 
Cataluña recycling of household waste
Cataluña recycling of household wasteCataluña recycling of household waste
Cataluña recycling of household waste
Jennifer Cataluña
 
機械学習を利用したちょっとリッチな検索
機械学習を利用したちょっとリッチな検索機械学習を利用したちょっとリッチな検索
機械学習を利用したちょっとリッチな検索
nobu_k
 

Viewers also liked (11)

Cataluña lab 2
Cataluña lab 2Cataluña lab 2
Cataluña lab 2
 
Cataluña financial intutions
Cataluña financial intutionsCataluña financial intutions
Cataluña financial intutions
 
Cataluña lab 1
Cataluña lab 1Cataluña lab 1
Cataluña lab 1
 
cataluna
catalunacataluna
cataluna
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Give yourself some credit cataluña
Give yourself  some credit cataluñaGive yourself  some credit cataluña
Give yourself some credit cataluña
 
Cataluña jennifer protect your good name
Cataluña jennifer  protect your good nameCataluña jennifer  protect your good name
Cataluña jennifer protect your good name
 
Protect your good name
Protect your good nameProtect your good name
Protect your good name
 
Эксклюзивный дизайн Kronenbourg от Лакруа
Эксклюзивный дизайн Kronenbourg от ЛакруаЭксклюзивный дизайн Kronenbourg от Лакруа
Эксклюзивный дизайн Kronenbourg от Лакруа
 
Cataluña recycling of household waste
Cataluña recycling of household wasteCataluña recycling of household waste
Cataluña recycling of household waste
 
機械学習を利用したちょっとリッチな検索
機械学習を利用したちょっとリッチな検索機械学習を利用したちょっとリッチな検索
機械学習を利用したちょっとリッチな検索
 

Similar to Cataluña computer forensics specialist

Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
kent neri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
kent neri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
mj tanasas
 
Forensics
ForensicsForensics
Forensics
Laura Aviles
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
techtutorus
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
JIEMS Akkalkuwa
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
ibraheem ogundele
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
Donald Tabone
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
Top Cyber Forensics Jobs And How To Get Them.pdf
Top Cyber Forensics Jobs And How To Get Them.pdfTop Cyber Forensics Jobs And How To Get Them.pdf
Top Cyber Forensics Jobs And How To Get Them.pdf
DataSpace Academy
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
Cetpa Infotech
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
lillian Kobusingye
 
Cyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdfCyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdf
shyamv3005
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
amallblitz0
 

Similar to Cataluña computer forensics specialist (14)

Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Forensics
ForensicsForensics
Forensics
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Top Cyber Forensics Jobs And How To Get Them.pdf
Top Cyber Forensics Jobs And How To Get Them.pdfTop Cyber Forensics Jobs And How To Get Them.pdf
Top Cyber Forensics Jobs And How To Get Them.pdf
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
 
R15 a0533 cf converted
R15 a0533 cf convertedR15 a0533 cf converted
R15 a0533 cf converted
 
Cyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdfCyber security course near me | Cyber security institute near me.pdf
Cyber security course near me | Cyber security institute near me.pdf
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
 

More from Jennifer Cataluña

My reaction paper.. hamilton
My reaction paper.. hamiltonMy reaction paper.. hamilton
My reaction paper.. hamilton
Jennifer Cataluña
 
Lord durana presentation
Lord durana presentationLord durana presentation
Lord durana presentation
Jennifer Cataluña
 
Cataluña home networks
Cataluña home networksCataluña home networks
Cataluña home networks
Jennifer Cataluña
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
Jennifer Cataluña
 
Cataluña ear the organ of hearing and balance2011
Cataluña ear the organ of hearing and balance2011Cataluña ear the organ of hearing and balance2011
Cataluña ear the organ of hearing and balance2011
Jennifer Cataluña
 
Cataluña ear the organ of hearing and balance
Cataluña ear the organ of hearing and balanceCataluña ear the organ of hearing and balance
Cataluña ear the organ of hearing and balance
Jennifer Cataluña
 
Cataluña ear the organ of hearing and balance
Cataluña ear the organ of hearing and balanceCataluña ear the organ of hearing and balance
Cataluña ear the organ of hearing and balance
Jennifer Cataluña
 
Ear
EarEar
Maintaining a healthy lifestyle
Maintaining a healthy lifestyleMaintaining a healthy lifestyle
Maintaining a healthy lifestyle
Jennifer Cataluña
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
Jennifer Cataluña
 
Cataluña protect your good name
Cataluña protect your good nameCataluña protect your good name
Cataluña protect your good name
Jennifer Cataluña
 
Cataluña postermaking contestant
Cataluña postermaking contestantCataluña postermaking contestant
Cataluña postermaking contestant
Jennifer Cataluña
 
Checks this out
Checks this outChecks this out
Checks this out
Jennifer Cataluña
 
Cataluña airplane rides
Cataluña airplane ridesCataluña airplane rides
Cataluña airplane rides
Jennifer Cataluña
 
Cataluña poster making
Cataluña poster makingCataluña poster making
Cataluña poster making
Jennifer Cataluña
 
Cataluña
CataluñaCataluña
Cataluña south haven park district
Cataluña south haven park districtCataluña south haven park district
Cataluña south haven park district
Jennifer Cataluña
 
Cataluña ice cream shop
Cataluña ice cream shopCataluña ice cream shop
Cataluña ice cream shop
Jennifer Cataluña
 
Cataluña ice cream shop
Cataluña ice cream shopCataluña ice cream shop
Cataluña ice cream shop
Jennifer Cataluña
 
Lakefront cataluña
Lakefront cataluñaLakefront cataluña
Lakefront cataluña
Jennifer Cataluña
 

More from Jennifer Cataluña (20)

My reaction paper.. hamilton
My reaction paper.. hamiltonMy reaction paper.. hamilton
My reaction paper.. hamilton
 
Lord durana presentation
Lord durana presentationLord durana presentation
Lord durana presentation
 
Cataluña home networks
Cataluña home networksCataluña home networks
Cataluña home networks
 
Cataluña antivirus program
Cataluña antivirus programCataluña antivirus program
Cataluña antivirus program
 
Cataluña ear the organ of hearing and balance2011
Cataluña ear the organ of hearing and balance2011Cataluña ear the organ of hearing and balance2011
Cataluña ear the organ of hearing and balance2011
 
Cataluña ear the organ of hearing and balance
Cataluña ear the organ of hearing and balanceCataluña ear the organ of hearing and balance
Cataluña ear the organ of hearing and balance
 
Cataluña ear the organ of hearing and balance
Cataluña ear the organ of hearing and balanceCataluña ear the organ of hearing and balance
Cataluña ear the organ of hearing and balance
 
Ear
EarEar
Ear
 
Maintaining a healthy lifestyle
Maintaining a healthy lifestyleMaintaining a healthy lifestyle
Maintaining a healthy lifestyle
 
Cataluña antivirus programs paper
Cataluña antivirus programs paperCataluña antivirus programs paper
Cataluña antivirus programs paper
 
Cataluña protect your good name
Cataluña protect your good nameCataluña protect your good name
Cataluña protect your good name
 
Cataluña postermaking contestant
Cataluña postermaking contestantCataluña postermaking contestant
Cataluña postermaking contestant
 
Checks this out
Checks this outChecks this out
Checks this out
 
Cataluña airplane rides
Cataluña airplane ridesCataluña airplane rides
Cataluña airplane rides
 
Cataluña poster making
Cataluña poster makingCataluña poster making
Cataluña poster making
 
Cataluña
CataluñaCataluña
Cataluña
 
Cataluña south haven park district
Cataluña south haven park districtCataluña south haven park district
Cataluña south haven park district
 
Cataluña ice cream shop
Cataluña ice cream shopCataluña ice cream shop
Cataluña ice cream shop
 
Cataluña ice cream shop
Cataluña ice cream shopCataluña ice cream shop
Cataluña ice cream shop
 
Lakefront cataluña
Lakefront cataluñaLakefront cataluña
Lakefront cataluña
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Cataluña computer forensics specialist

  • 1. Mary Hankins<br />Mr. Habib<br />Business 102<br />14 March 2008<br />Computer Forensics Specialist<br /> Computer forensics also called digital forensics, network forensics, or cyber forensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.<br /> A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to (Shelly and Cashman)(Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. Computer forensics specialists must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and updates skills, and a knack for problem solving.<br /> When a problem occurs, it is the responsibility of the computer forensics specialists to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and /or testimony as required (Reinman 52-58)<br /> A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry-level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turell and Gutierrez 44-45)<br /> With the growing use of computers in all areas of life, the number of computer crime surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.<br />Works Cited BIBLIOGRAPHY Reinman, David P. quot; Fighting Cybercriminals.quot; Cybertech Monthly February 2008: 52-58.Shelly, Gary B. and Thomas J. Cashman. quot; Computer Careers.quot; Course Technology 7 March 2008: <www.scsite.com/wd2007/pr2/wc.htm>.Turell, Marcia O. and Alex N. Gutierrez. Cybercrimes and Criminals El Paso: Legal Works Publishing Company 2008: 44-45.<br />