- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 150字
- 2021-06-24 16:38:56
The mobile phone evidence extraction process
Evidence extraction and the forensic examination of different mobile devices may differ based on various factors. However, following a consistent examination process will help the forensic examiner to ensure that the evidence gathered from each phone is well documented and that the results are reliable. There is no well-established standard process for mobile forensics.
However, the following diagram provides an overview of process considerations for the extraction of evidence from mobile devices. All methods used when extracting data from mobile devices should be tested, validated, and well documented:
As shown in the preceding diagram, forensics on a mobile device includes several phases, from the evidence intake phase to the archiving phase. The following sections provide an overview of various considerations across all the phases.
- Node Security
- 網絡安全應急管理與技術實踐
- INSTANT Burp Suite Starter
- 計算機病毒分析與防范大全(第3版)
- 深入淺出隱私計算:技術解析與應用實踐
- 安全實戰之滲透測試
- 數據安全與隱私計算(第3版)
- 數據要素安全:新技術、新安全激活新質生產力
- Bug Bounty Hunting Essentials
- Cybersecurity Threats,Malware Trends,and Strategies
- Mastering Malware Analysis
- 黑客攻防從入門到精通:命令版
- 網絡空間安全實戰基礎
- Manga Studio 5 Beginner's Guide
- 黑客攻防從入門到精通:絕招版(第2版)