A.B.
C.D.E.
F.
G.H.
I.J.K.L.
M.N.O.P.
Q.R.
S.T.
U.V.W.X.
Y.Z.
IT forensics:
Digital trace search with fingertip sensation
Cybercriminals operate in secret.
IT forensics can pick up their tracks and identify the perpetrators.
IT forensics evaluate the digital traces left by criminals.
However, detective flair is not the only prerequisite for the job.
IT forensics become active in cyber attacks such as phishing, scamming or hacking.
Some people have never heard these words before. Some may have already been victims of a phishing attack, namely when fraudsters on a fake web page,
Have stolen passwords. Some were persuaded by scammers in the net to transfer money for an apartment that does not exist. Or a hacker has got access to their own PC.
Cybercriminality has many facets. The IT forensic is used here.
When do IT forensics come into play?
Marion Liegl is such an IT forensic. The 36-year-old is self-employed and runs her company in Gera.
Liegl mainly works for companies that have become victims of cybercriminality. If the network of a company is attacked, it is available. Liegl then starts to back up data.
Where do IT forensics work?
The profession of IT forensic is becoming more and more important. Computers, Smartphones, Tablets, Game Consoles:
Everyone leaves many traces on the net every day, making them vulnerable. IT forensics work, for example, in investigators, ministries or IT security departments of large companies,.
|