Digital Forensics

1058 Words3 Pages

Question 1 An employment opportunity in the digital and computer forensics field is a position as an Ethical Hacker/Security Penetration Tester with Symphony. This position requires that a candidate be knowledgeable with softer ware development and be able to rest applications and computer systems within the company for vulnerabilities. The position requires that the candidate have a bachelor’s degree in computer science or a related field; 10+ years experience in Information Security, or an equivalent combination; Security related certifications a plus; Knowledge of security implications when coding in a specific languages; and other various skills related to specified knowledge and experience. The compensation for the position is a competitive …show more content…

This topic is an important one to the field of digital forensics as there is limited research into why people become victims online and how to prevent it. This is a relevant topic because technology and the Internet lack acceptable guardianship and allow for people to become victimized easier. The book discusses how everyday activities online and with technology can put a person more at risk to become a victim. This a relevant topic because further understanding on this topic can help to minimize crimes and victimization. This can allow for digital investigators to better understand how criminals choose their victims, how people victimized, and how to better prevent the situations from occurring. 2. Dykstra, J., & Sherman, A. (2012). Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation, 9, S90-S98. Retrieved September 7, 2015, from …show more content…

This book is relative to digital forensics because it demonstrates the broad scope of cyber and computer crimes. The crimes discussed consist of hacking, financial fraud, child exploitation, phreaking, identity theft, etc. The various methods used by criminals to commit said crimes is also discussed and how these methods are evolving and becoming more efficient. The book is relevant because it demonstrates how expansive cybercrime, computer crime, and digital forensics actually are. The book discusses hacking and although that seems to be a straightforward topic, there are various types of hackers and methods that they use that re

Open Document