SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Hankins 1


Mary Hankins

Mr. Habib

Business 102

14 March 2008

                                      Computer Forensics Specialist

        Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a

rapidly growing field that involves gathering and analyzing evidences from computers and networks.

Because computers and the internet are the fastest growing technology used for criminal activity, the

need for computer forensics specialists will increase in years to come.

        A computer forensics specialist examines computer media, programs, data, and log files on

employ computer forensics specialists, including law enforcement, criminal activity, the need for

computer forensics specialists will increase in years to come.

        A computer forensics specialist examines computer media, programs, data, and log files on

computers, servers, and networks. According to Shelly and Cashman (Computer Careers), many areas

employ computer forensics specialists, including law enforcement, criminal prosecutors, military

intelligence, insurance agencies, and information security departments in the private sector. A computer

forensics specialist must have knowledge of the law, technical experience with many types of hardware

and software products, superior communication skills, a willingness to learn and update skills, and a

knack for problem solving.

        When a problem occurs, it is the responisbility of the computer forensics specialist to carefully

take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer.

These steps include protecting the suspect’s computer, discovering all files, recovering deleted files,

consulting and/or testimony as required (Reinman 52-58).

        A computer forensics specialist must have knowledge of all aspects of the computer, from the

operating system to computer architecture and hardware design. In the past, many computer forensics

specialists were self-taught computer users. Today, extensive training, usually from several different
Hankins 2


sources, is required. A degree in Computer Science should be supplemented with graduate courses and

university-level professional development certificates. Entry level salaries range from $45,000 to

$75,000. With experience and certifications, salaries can exceed $125,000 (Turrel 44-45).

        With the growing use of computers in all areas of life, the number of computer crimes surely will

continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many

years to come.
Hankins 3


                                          Works Cited

Reinman, David P. “Fighting Cybercriminals.” Cybertech Monthly February 2008: 52-58.

Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008

      www.scsite.com/wd2007/pr2/wc.htm.

Turell, Maria O., and Alex N Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing

                                        Company, 2008.

Weitere ähnliche Inhalte

Was ist angesagt?

Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neriaejay_neri
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialistJennifer Cataluña
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1maranan_zyra
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)lord_durana
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neriaejay_neri
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1ricky098
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1zamayla143
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipnerikent neri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent warkent neri
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 

Was ist angesagt? (20)

Computer forensics paper ---neri
Computer forensics paper ---neriComputer forensics paper ---neri
Computer forensics paper ---neri
 
Computer forensics paper
Computer forensics paperComputer forensics paper
Computer forensics paper
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Cataluña computer forensics specialist
Cataluña computer forensics specialistCataluña computer forensics specialist
Cataluña computer forensics specialist
 
Computer Forensics Specialist
Computer Forensics SpecialistComputer Forensics Specialist
Computer Forensics Specialist
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Maranan chap.2 lab 1
Maranan chap.2 lab 1Maranan chap.2 lab 1
Maranan chap.2 lab 1
 
Mary hankins(lord)
Mary hankins(lord)Mary hankins(lord)
Mary hankins(lord)
 
Research paper -- neri
Research paper -- neriResearch paper -- neri
Research paper -- neri
 
Dungogan chap2 lab 1
Dungogan chap2 lab 1Dungogan chap2 lab 1
Dungogan chap2 lab 1
 
Zamayla chap2 lab 1
Zamayla chap2 lab 1Zamayla chap2 lab 1
Zamayla chap2 lab 1
 
Kent philipneri
Kent philipneriKent philipneri
Kent philipneri
 
Markbrakent war
Markbrakent warMarkbrakent war
Markbrakent war
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Andere mochten auch

Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Enriquee Guevarra
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Enriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalitiesEnriquee Guevarra
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Enriquee Guevarra
 

Andere mochten auch (8)

Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)Leadership is stewardship (Ej guevarra)
Leadership is stewardship (Ej guevarra)
 
Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)Chap 2 lab 3 (Ej Guevarra)
Chap 2 lab 3 (Ej Guevarra)
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)Leading different personalities (Ej Guevarra)
Leading different personalities (Ej Guevarra)
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 

Ähnlich wie Hankins 1 (Ej Guevarra)

Computer Forensics Tools And Resources For Hjc Corporation
Computer Forensics Tools And Resources For Hjc CorporationComputer Forensics Tools And Resources For Hjc Corporation
Computer Forensics Tools And Resources For Hjc CorporationLarissa Swenson
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber SecurityPrashant Sharma
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Computer Forensics And The Internet
Computer Forensics And The InternetComputer Forensics And The Internet
Computer Forensics And The InternetSamantha Caldwell
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx
94 C o M M u N i C at i o N s o f t H e a C M j A.docxevonnehoggarth79783
 

Ähnlich wie Hankins 1 (Ej Guevarra) (14)

Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Computer Forensics Tools And Resources For Hjc Corporation
Computer Forensics Tools And Resources For Hjc CorporationComputer Forensics Tools And Resources For Hjc Corporation
Computer Forensics Tools And Resources For Hjc Corporation
 
Forensics
ForensicsForensics
Forensics
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
C018131821
C018131821C018131821
C018131821
 
Computer Forensics And The Internet
Computer Forensics And The InternetComputer Forensics And The Internet
Computer Forensics And The Internet
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx94    C o M M u N i C at i o N s  o f  t H e  a C M       j A.docx
94 C o M M u N i C at i o N s o f t H e a C M j A.docx
 

Mehr von Enriquee Guevarra

Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalitiesEnriquee Guevarra
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Enriquee Guevarra
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Enriquee Guevarra
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Enriquee Guevarra
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Enriquee Guevarra
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Enriquee Guevarra
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Enriquee Guevarra
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Enriquee Guevarra
 

Mehr von Enriquee Guevarra (13)

Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading different personalities
Leading different personalitiesLeading different personalities
Leading different personalities
 
Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)Leadership is stewardship (ej guevarra)
Leadership is stewardship (ej guevarra)
 
Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)Leading Different Personalities (Ej Guevarra)
Leading Different Personalities (Ej Guevarra)
 
Music for life (Ej Guevarra)
Music for life (Ej Guevarra)Music for life (Ej Guevarra)
Music for life (Ej Guevarra)
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )Shop for sale ( Ej Guevarra )
Shop for sale ( Ej Guevarra )
 
Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )Rent a cabin ( Ej Guevarra )
Rent a cabin ( Ej Guevarra )
 
Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )Rent a cabin ( ej guevarra )
Rent a cabin ( ej guevarra )
 
Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )Airplane rides ( Ej Guevarra )
Airplane rides ( Ej Guevarra )
 
Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )Craft barn ( Ej Guevarra )
Craft barn ( Ej Guevarra )
 
Craft barn
Craft barnCraft barn
Craft barn
 
Autumn festival
Autumn festivalAutumn festival
Autumn festival
 

Kürzlich hochgeladen

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServiceRenan Moreira de Oliveira
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 

Kürzlich hochgeladen (20)

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer ServicePicPay - GenAI Finance Assistant - ChatGPT for Customer Service
PicPay - GenAI Finance Assistant - ChatGPT for Customer Service
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 

Hankins 1 (Ej Guevarra)

  • 1. Hankins 1 Mary Hankins Mr. Habib Business 102 14 March 2008 Computer Forensics Specialist Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidences from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on employ computer forensics specialists, including law enforcement, criminal activity, the need for computer forensics specialists will increase in years to come. A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cashman (Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving. When a problem occurs, it is the responisbility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, consulting and/or testimony as required (Reinman 52-58). A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different
  • 2. Hankins 2 sources, is required. A degree in Computer Science should be supplemented with graduate courses and university-level professional development certificates. Entry level salaries range from $45,000 to $75,000. With experience and certifications, salaries can exceed $125,000 (Turrel 44-45). With the growing use of computers in all areas of life, the number of computer crimes surely will continue to rise. As a result, the need for skilled specialists to battle these crimes will increase for many years to come.
  • 3. Hankins 3 Works Cited Reinman, David P. “Fighting Cybercriminals.” Cybertech Monthly February 2008: 52-58. Shelly, Gary B., and Thomas J. Cashman. “Computer Careers.” Course Technology. 7 March 2008 www.scsite.com/wd2007/pr2/wc.htm. Turell, Maria O., and Alex N Gutierrez. Cybercrimes and Criminals. El Paso: Legal Works Publishing Company, 2008.