1 Introduction
Everyone needs to be clear about their future, and students are no exception. Polytechnic students are already one step into their future career, as the course that they are studying are usually related to their work or their course in university in the near future. Stephen Covey, an American educator, said to “begin with the end in mind”. By knowing the jobs that I intend to pursue in the future, I will be able to start creating my own path of career to success and strive hard to achieve the goal. The purpose of this assignment is to explore career opportunities that are related to my course, and how my course and Co-Curriculum Activities (CCA) will be able to help me achieve my career goal.
2 Preferred Jobmos
2.1 Ideal Job
…show more content…
Furthermore, he/she must also assist in investigation planning and fieldwork, including project plan development, preparation of tools and methods, evidence collection, analysis, reporting and evidence management as well as assisting senior personnel in communicating findings and results of investigations to Management. (National Infocomm Competency Framework, 2012)
Qualifications:
A digital forensic investigator must have Diploma or Degree in Information Security, Information Technology, Computer Engineering or equivalent. It will be beneficial if one has a professional certification in relevant areas. (National Infocomm Competency Framework, 2012)
Tools/Skill Sets required:
Acquiring Data and Evidence: Acquiring data from a computer network environment presents a major challenge for investigators. Evidence from networks and network-attached hardware needs to be copied during an investigation to ensure that it is kept forensically safe. Without tools and training, it is impossible to gather digital evidence, let alone identify and find all the components in a home network such as printers and external hard drives. (National Institude of Justice, 2010) Therefore, it is very important that a Digital Forensics Investigator knows that right way in acquiring data and
The author goes on to talk about how technology impacts an investigation and how detectives use technology to collect and record data. Future technology is also discussed in this article and how scientist predict future technology will produce more accurate results in cases. In the world today technology is not always right there is instances where technology have had negative results. This article is current and is a great source for my final project by giving me knowledge on how detectives use technology and science to complete their
This ultimately results is a subsequent communication which requires the holder to disclose those passwords or taking on an additional task of tracking the passwords. In both the cases, the level of work is expanded and the police investigator has to take on additional tasks then he was initially required to. This while increasing the cost of investigation also increases the time taken in investigation. Therefore while identifying the property, or the hardware of the computer, an inclusion needs to be made in relation to the passwords that may be protecting that hardware. Similarly for the data demanded in the digital format the investigator, would have to highlight that mere data in digital format is not required, but also the passwords or the code's which restrict access to that data are also required.
4.7.5 Data Preservation and Isolation from the Network. The main purpose of a digital forensic report is to keep the data integrity, avoiding any type of data alteration, in order to present valid evidences, for instance in a court. The use of not valid software to check the stored information in a mobile phone can alter these information. The action of receive new data can alter the information stored, for instance an automatic firmware update, or remote device control with the risks involved. Therefore, it is extremelly important have the device completely isolated from the network.
Being a CSI agent offers tons of exciting action with interesting daily tasks, mental challenges, and modest educational requirements compared to most occupations. CSI agents experience many interesting daily tasks, they first walk through the crime scene to determine what evidence is available and collect it. According to Chron, DNA experts use bodily fluids and substances to identify criminal subjects even in cases that are very old. Using small details such as fibers, hair, paint, glass, pollen and food residue, that discovers case specifics. This shows that CSI can uncover things with the smallest pieces of evidence to catch suspects.
This includes finding evidence of criminal activity and regaining data from computer hard drives, even those that have been damaged or deleted. They analyze this data for clues and evidence, and may trace hacks or gauge the effects of malware on an information system. For many employers, applicants must have a bachelor’s degree in computer information systems or computer science. Some also require skills gained from an advanced degree program. Examples of some skills include a firm working knowledge of various operating and network systems, data retrieval procedures, and the ability to provide IT
Forensic Science is the career field I am interested in. I would enjoy being a forensic science technician because of my interest in mysteries and figuring things out. This career choice is the right choice for me because I would only need a Bachelor’s degree, it would be work I enjoy doing, and I would make an exceptional salary. Forensic science technicians aid investigations by collecting and testing evidence. Many technicians spend time either in a laboratory or on the field in crime scene investigation.
They face everyday challenges to determine the causes of deaths and assist law enforcement with their investigations. In order to become a forensic pathologist, it requires a medical degree or doctor of osteopathy degree. It typically takes a total
Nowadays it is becoming harder and harder to commit the perfect crime. Forensic has become very important with supporting in getting a conviction than ever before. It used to be harder to find matching fibers and DNA on a crime scene (Cohen, 2007). The improvements of technology law enforcement has been able to create procedures and tools that assist with making a lot more happen nowadays. When the system was first create it had it glitches.
Computer forensics processes must adhere to standards set by the courtroom that often complicates what could have been a simple data analysis. In court, knowing who connected to the system based on logs is not enough. There must be facts that will support those connection
Getting a job in forensics takes the ability to incorporate all of the scientific strengths learned and the love for solving crimes. Giving expertise on legal activities also plays a major role in investigating and solving misdemeanors(“Discover Careers in Forensic Science”). Many occupations in forensics can be sometimes labeled as morbid or gruesome. Some of these careers may include, forensic crime scene investigators, coroners, anthropologists, and pathologists(forensic medical examiners)(Palmer). These professions salaries can range anywhere from 50,000 to over 200,000 a year(Kaelin).
This module and coursework requirements were directed to present some crucial and effective experience for me. During the entire course, I had learnt a number of different learning, which can be proved quite helpful for me to build a successful and attractive career ahead. I can present the significance of the coursework activities done in terms of my learning from this subject. The reflection of the coursework learning can be presented as below: Problems faced during the research work: Although I have been able to finish my coursework requirements within the time frame.
As a security director for this large corporation, I understand that there are certain procedures that need to be followed in order to properly conduct a successful computer forensic investigation. The most important thing is to ensure that the chain of custody is maintained for any computer evidence found or recovered. From the moment you take possession of the evidence until the time the evidence is presented in a court of law you must be able prove who had possession of the evidence, when they had it and where the evidence was stored. Whenever evidence is found during a computer forensic investigation there are some simple steps that should be followed to ensure the evidence is preserved and usable in court.
By reflecting upon personal, work and school experiences, this paper has provided evidence of my personal progress since the beginning of my bachelor. Using a critical reflective approach has allowed me to recognize my mistakes and lacks of and reflect on them as well as learning how take advantage of my strengths. Using the CareerEDGE model and the NTU Graduate Attribute Matrix to structure this report, I have identified several key learning points; • I have identified relevant opportunities for my upcoming master degree. • I have now, a deeper and clearer understanding with regards to global openness and global mindset. • I have acknowledged ways I can continue to progress and improve my skills and attributes in order to reach a full employability potential.
The following section will consider advantages and limitation of the first two mentioned types of digital forensics: Traditional (dead) and Live computer forensics. TRADITIONAL (DEAD) VS LIVE DIGITAL FORENSICS Traditional (Dead) Forensics In order forensic acquisition to be more reliable it must be performed on computers that have been powered off. This type of forensics is known as ‘traditional’ or 'dead ' forensic acquisition. The whole process of dead acquisition, including search and seizure flowchart and acquisition of digital evidence flowchart is shown on Figure 2 and Figure 3 respectively.
As far back as 2001 when the first “Digital Forensics Workshop” was held and a case for standards was made, considerable progress has been made in ensuring the growth and expansion of the practice of computer forensics. Mason (2003) suggested the need for standards by which digital forensic practitioners ensure that evidences for prosecuting cases in the law courts are valid as more judgments from a growing number of cases were reliant on the use of electronic and digital evidences in proving the cases. XXXX (2005 & 2007) emphasized the dynamic nature of technology and its impact on the digital forensics field. Hence, the need for having early standards in regulating the