CIS 417
Professor DR. Ed Lindoo
As a system forensics specialist I am here to help your business achieve goals based on security and confidentiality. Some of my basic tasks and high level investigation process is to use evidence to reconstruct past events and activities. Forensic specialist also use evidence to gain a better understanding of a crime (John R. Vacca & K Rudolph, 2011). I will also use this evidence to show possession and handling of digital data.
There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They …show more content…
The fact that by time a lot of the evidence is examined it’s normally too late and can’t even be used. A lot of forensic examiners do not understand investigation, causing them to overlook relevant information and expand resources (Charles L Cohen, n.d.). This is why training is so important but lack of funds can be another limitation because there is only so much money to spend on training and resources.
Computing devices are used in crimes today and can affect a company’s data and information. Some examples of computing devices that are used in crimes are smart phones, computers, digital video recorders, digital cameras, gaming systems that store data, digital music players and other electronic storage devices. Some of these devices can shutdown an operation to a business causing millions of dollars. An example would even be a DOS attack which could shutdown people from accessing your companies website. This means that wouldn’t be able to make purchases or check there