COMPUTER FORENSICS AND FORENSICS TECHNOLOGY BY MARI A. CHAN.

Slides:



Advertisements
Similar presentations
Antonia S.. The Career  The use of science and technology to investigate and establish facts in criminal or civil courts of law.
Advertisements

… Teacher registration in Queensland… Information for preservice teachers from Queensland universities.
Forensic and Investigative Accounting Chapter 2 Forensic Accounting Education, Institutions, and Specialties © 2009 CCH. All Rights Reserved W. Peterson.
2 Language of Computer Crime Investigation
 COMMUNITY COURTS RESTORATIVE JUSTICE FOR A SAFER PLEASANT CITY FOR ALL/ dec 2011/tc.
Data Collection, Analysis and Preservation Computer Forensics: Data Collection, Analysis and Preservation Kikunda Eric Kajangu, Cher Vue, and John Mottola.
Crime Laboratories Forensic Science Mr. Glatt
ACCIDENT INVESTIGATION
Forensic and Investigative Accounting
Look Before You Leap: Forensic Investigations Financial Fraud MGT
Sociology 601(Martin) Lecture for week 2: September Chapter 3.1: –Making Charts Chapter 3.2 – 3.5 (if time permits) –Measures of central tendency.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Forensic Psychology Denise.
Forensic and Investigative Accounting Chapter 2 Forensic Accounting Education, Institutions, and Specialties © 2007 CCH. All Rights Reserved W. Peterson.
Forensic Accounting. Agenda Definition History Skills Business scandals Cases.
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
Aliecia Palomo Estep-7 10/15/13. Requirements For This Career This type of career requires at least a high school diploma, college degree or higher.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Brooklyn Mullins. Quick Facts: Paralegal 2012 Median Pay$46,900 year $22.59 per hour Entry-Level EducationAssociate’s degree Number of Jobs, ,000.
Private Detective BY: Jocelyn Vazquez
COEN 152 Computer Forensics Introduction to Computer Forensics.
Fire Investigator e-book. Fire Investigators collect and analyze evidence from the scene of a fire.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Introduction to Knoppix-STD: Forensic Analysis of a Compromised Linux Harddrive Dana M. Epp Computer Security Software Architect Scorpion Software Corp.
What’s in it for Me?. Recognition Program The Recognition Program requires extra work on the part of a Department. Why do we need to do it???
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
Professional Development: Group 1 Career Topic COMPUTER FORENSICS.
Computer Forensics Principles and Practices
Career Opportunities Mary Tran. Why a career search is important… To provide a stable income To give yourself fulfillment in life To broaden your education.
The real CSI: By Marissa O'Hair. Forensic Scientist Technician Why’d I Pick It?  Like CSI  Intriguing  Exciting  Mysterious  Brings justice.
ISA Domain 10: Legal, Regulations, Compliance, & Investigations ISA 562 Internet Security Theory & Practice.
Computer Forensics specialist By Andrew Shore Davis Sanders.
Law Enforcement Ideal Job. Law Enforcement 1) FBI Agent 2) Police Officer 3) U.S. Marshal 4) Forensic Scientist 5) State Trooper 6) Customs Agent 7) Secret.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, Sixth Edition Chapter 9, Part 10 Satisfying Customer Needs.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Computer Forensics An introduction Jessie Dunbar, Jr. Lynn Johnston Andrew Preece Kathy Spaulding September 18, 2007.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.
Local Police- local jurisdiction 3 Main responsibilities: 1.Law Enforcement- investigate crimes, make arrests, appear in court 2.Community Patrol- traffic,
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Forensic Science/ Forensic Psychologist By: Isabella hunt 6 th
Nadir Hajiyani NADIR HAJIYANI CSC 253 OCFA. Agenda What Who Specification Architecture - How Snapshots Help Open Source Disadvantages Advantages References.
Crime Scene Photographer Jordan Chin-Sang 11/10/2015.
COMPUTER FORENSICS By Jason Ford and Anthony Kniffin.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Business Computer Applications I Business Computer Applications II Accounting Principles I Accounting Principles II Business Law (offered 2017) Intro to.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Technical Support Five basic services. Five basic services. Physical Science Unit – chemistry, physics, and geology to identify and compare physical evidence.
SEC 430 OUTLET The learning interface/sec430outletdotcom.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
JURISPRUDENCE By: Ella Hauer. What is Forensic Science? ■The application of science to criminal and civil laws. Forensic scientists collect, preserve,
Criminal Prosecutors with Computer Forensics
College of Adult & Professional Studies Criminal Justice Program
IRS Criminal Investigation
Criminal Justice Careers
Introduction to Digital Forensics
Ad Hoc Phase Structured Phase Enterprise Phase
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Crime Lab Agencies.
Introduction to Digital Forensics
Business Intent Presentation
Presentation transcript:

COMPUTER FORENSICS AND FORENSICS TECHNOLOGY BY MARI A. CHAN

THE GOAL OF COMPUTER FORENSICS: Is to perform a structure investigation while maintaining a documented chain of evidence to find out exactly what happened and who was responsible for it (CF). Some people might not understand how Computer forensic works or even what Computer Forensic is?

WHAT IS COMPUTER FORENSICS? Computer Forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law (CF).

COMMON USE OF COMPUTER FORENSICS: Employee internet abuse Unauthorized disclosure of Corporate information and data Damage assessment Criminal fraud and deception case

MAJOR IMPROVEMENT IN FORENSICS TECHNOLOGY DNA Testing and Analysis Polygraph Machines Automated ID Systems

COMPUTER FORENSICS SALARY BY STATES StateAvg SalaryStateAvg SalaryStateAvg Salary Alabama$98,000Louisiana$74,000Ohio$84,000 Alaska$77,000Maine$73,000Oklahoma$83,000 Arizona$80,000Maryland$95,000Oregon$87,000 Arkansas$79,000Massachusetts$101,000Pennsylvania$86,000 California$90,000Michigan$88,000RI$87,000 Colorado$81,000Minnesota$83,000SC$82,000 Connecticut$95,000Mississippi$115,000SD$84,000 Delaware$88,000Missouri$95,000Tennessee$91,000 Florida$88,000Montana$93,000Texas$86,000 Georgia$95,000Nebraska$81,000Utah$73,000 Hawaii$74,000Nevada$86,000Vermont$94,000 Idaho$75,000NH$85,000Virginia$95,000 Illinois$96,000NJ$93,000Washington$80,000 Indiana$93,000NM$85,000Wash, DC$105,000 Iowa$90,000NY$107,000W. Virginia$108,000 Kansas$79,000NC$90,000Wisconsin$75,000 Kentucky$97,000ND$94,000Wyoming$90,000

COMPUTER FORENSICS SALARY BY STATES

ANNUAL SALARY OVER THE PAST FIVE YEARS

Work Cited “Computer Forensics Salary.” Justice School Info Education and Career Guide. Dec. 8, Dec. 4, 2013 Dick Warrington. “Thirty Years of Change.” Forensic Magazine. July Dec. 4, 2013 Sharon L. Cohen. “About Forensic Technology.” EHow. Aug.24, Dec. 4, 2013 “Computer Forensics.” Searchsecurity. May 2, Dec. 4, 2013 “How Technology Changed Our Lives in the Last Five Years.” The Center of Technology. July 8, Dec. 4, 2013 Monica. “A Community of Computer Forensics Professionals.” Computer forensics World. Aug. 27, Dec. 4, 2013 “Forensic Computer Analyst Average Salary.” Pay Scale. Nov. 24, Dec. 4, 2013