SlideShare una empresa de Scribd logo
1 de 3
Hankins 1


Mary Hankins

Mr. Habib

Business 102

14 March 2008

                                      Computer Forensics Specialist

        Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a

rapidly growing field that involves gathering and analyzing evidences from computers and networks.

Because computers and the internet are the fastest growing technology used for criminal activity, the

need for computer forensics specialists will increase in years to come.

        A computer forensics specialist examines computer media, programs, data, and log files on

employ computer forensics specialists, including law enforcement, criminal activity, the need for

computer forensics specialists will increase in years to come.

        A computer forensics specialist examines computer media, programs, data, and log files on

computers, servers, and networks. According to Shelly and Cashman (Computer Careers), many areas

employ computer forensics specialists, including law enforcement, criminal prosecutors, military

intelligence, insurance agencies, and information security departments in the private sector. A computer

forensics specialist must have knowledge of the law, technical experience with many types of hardware

and software products, superior communication skills, a willingness to learn and update skills, and a

knack for problem solving.

        When a problem occurs, it is the responisbility of the computer forensics specialist to carefully

take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer.

These steps include protecting the suspect’s computer, discovering all files, recovering deleted files,

consulting and/or testimony as required (Reinman 52-58).

        A computer forensics specialist must have knowledge of all aspects of the computer, from the

operating system to computer architecture and hardware design. In the past, many computer forensics

specialists were self-taught computer users. Today, extensive training, usually from several different
Hankins 2


sources, is required. A degree in Computer Science should be supplemented with graduate courses and

university-level professional development certificates. Entry level salaries range from $45,000 to

$75,000. With experience and certifications, salaries can exceed $125,000 (Turrel 44-45).

        With the growing use of computers in all areas of life, the number of computer crimes surely will

continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many

years to come.
Hankins 3


                                          Works Cited

Reinman, David P. “Fighting Cybercriminals.” Cybertech Monthly February 2008: 52-58.

Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008

      www.scsite.com/wd2007/pr2/wc.htm.

Turell, Maria O., and Alex N Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing

                                        Company, 2008.

Más contenido relacionado

La actualidad más candente

Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neriaejay_neri
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1maranan_zyra
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)lord_durana
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neriaejay_neri
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipnerikent neri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 

La actualidad más candente (20)

Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Destacado

Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Enriquee Guevarra
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Enriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalitiesEnriquee Guevarra
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Enriquee Guevarra
 

Destacado (8)

Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)
 
Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 

Similar a Hankins 1 (Ej Guevarra)

The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber SecurityPrashant Sharma
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 

Similar a Hankins 1 (Ej Guevarra) (12)

Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Forensics
ForensicsForensics
Forensics
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
C018131821
C018131821C018131821
C018131821
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 

Más de Enriquee Guevarra

Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalitiesEnriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Enriquee Guevarra
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Enriquee Guevarra
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Enriquee Guevarra
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Enriquee Guevarra
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Enriquee Guevarra
 

Más de Enriquee Guevarra (13)

Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )
 
Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )
 
Craft barn
Craft barnCraft barn
Craft barn
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Hankins 1 (Ej Guevarra)

  • 1. Hankins 1 Mary Hankins Mr. Habib Business 102 14 March 2008 Computer Forensics Specialist Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidences from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on employ computer forensics specialists, including law enforcement, criminal activity, the need for computer forensics specialists will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cashman (Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, it is the responisbility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, consulting and/or testimony as required (Reinman 52-58). A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different
  • 2. Hankins 2 sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turrel 44-45). With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.
  • 3. Hankins 3 Works Cited Reinman, David P. “Fighting Cybercriminals.” Cybertech Monthly February 2008: 52-58. Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008 www.scsite.com/wd2007/pr2/wc.htm. Turell, Maria O., and Alex N Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company, 2008.