computer forensic technologic
DESCRIPTION
By María Belén Sáenz de Viteri 2012-2013TRANSCRIPT
![Page 1: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/1.jpg)
Computer Forensic
Technology
Ma. Belen Sáenz de Viteri 6to Informatics – A2
![Page 2: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/2.jpg)
Charley Babbage invented and development the “Difference Engine” in 1822 considered the first automatic computer engine.
Computer Forensics is also called Cyberforensics. It is the application of computer investigation and analysis techniques to gather evidence, suitable for presentation in a court of law.
WHEN IT BEGAN?
![Page 3: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/3.jpg)
Human beings have made great advantages, but with
the time informatics criminals have emerged. They are
know as hackers.
Ecuadorian universities that provide computer science
should promote advantages providing many job
opportunities, creating useful data collection banks,
increasing company’s security assurance, and trained
skilled Ecuadorian users.
![Page 4: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/4.jpg)
Recruitment agencies and job sites. (Counter Frauds, Forensic Skills and Blue line jobs)
Great Salaries
Forensic Technology will provide job opportunities
![Page 5: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/5.jpg)
Table of Salaries
![Page 6: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/6.jpg)
1. Collection (data gathered)
2. Examination (data divided into parts)
3. Analysis ( Result of the examination)
4. Reporting (Recommendation, vulnerabilities)
Forensic Process
![Page 7: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/7.jpg)
1. Back-track information
2. Criminal persecutions
It will use data collection banks
3. Corporative Purpose
4. Judicial Orders
![Page 8: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/8.jpg)
Companies security assurance
Ecuador is not safe from cyber-attacks (statistics from Public Safety Observatory Guayaquil – Jan 1 to Dec 12/2010 more than 199 complaints of illegal bank transfers)
![Page 9: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/9.jpg)
Hackers
Skipt Kiddie
Cracker
Train Ecuadorian Users
![Page 10: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/10.jpg)
HTTPS vs HTTP / WIFI
![Page 11: Computer Forensic Technologic](https://reader036.vdocument.in/reader036/viewer/2022062405/55860d51d8b42a8a638b4f5d/html5/thumbnails/11.jpg)
To ConcludeBecause of these reasons, Ecuador will be prepared for any future hacking attack. Moreover, Ecuadorian users will be ready and also the percentage of cyber attacks will decrease. Universities should consider this innovative career.