English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

How much do they make? What is their responbilities? What do they do? What are the qualifications for this occupation?

2007-11-07 14:53:52 · 3 answers · asked by Anonymous in Computers & Internet Security

3 answers

Cybercrime investigator, as its title named, is to investigate any crime relating to cyber-world or computer-related crime.

It is the same rank as investigator in Police force (at least in Hong Kong). In private sector, they may be consultant and charge HKD30k per case.

The qualification is:
1. Graduated from university (including Postgraduated) in computing or I.T.
2. Qualified to join police force which means no crimial records over the three generations.(from grand-parent to themselves)
3. Receive training which will be in three levels. Those three levels are recognized by FBI and International police.
4. then, start field practice.

(The above information was provided by a career briefing)

2007-11-07 15:08:57 · answer #1 · answered by giginotgigi 7 · 1 0

The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage.

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

2007-11-07 15:02:22 · answer #2 · answered by Anonymous · 0 0

What the priority has been from the initiating is that Anti-believe in computers and alertness substitute right into a flowery legal Ponzi - Scheme by potential of Microsoft and now starting to be greater on Apple computers. Your psychological sources is Being stolen greater and greater because of the fact the years play out, and computers could be made to return with a warning label pointing out that !.. Now Hacking has substitute into Beta Bit hacks, and Beta key logging out and in devoid of you even responsive to it lots of the time, by potential of your Hardware and alertness information VIN. shopper pay attention ? there's a clever O.S. gadget that could be written yet they gained't do it, why because of the fact Governments won't have the potential to hack them. and that they could get into your computers not in basic terms in this united states, yet different Governments in different countries to boot, because of the fact they could pay lower back the those that have been given them Elected..."remember that area of Corrupt Politics, "believe it or not ?

2016-09-28 13:51:26 · answer #3 · answered by lacie 4 · 0 0

fedest.com, questions and answers