- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 219字
- 2021-06-24 16:38:57
The isolation phase
Mobile phones are, by design, intended to communicate via cellular phone networks, Bluetooth, infrared, and wireless (Wi-Fi) network capabilities. When a phone is connected to a network, new data is added to the phone through incoming calls, messages, and application data, which modifies the evidence on the phone.
Complete destruction of data is also possible through remote access or remote wipe commands. For this reason, isolation of the device from communication sources is important prior to the acquisition and examination of the device. Network isolation can be done by placing the phone in radio frequency shielding cloth and then putting the phone in airplane or flight mode. Airplane mode disables a device's communication channels, such as cellular radio, Wi-Fi, and Bluetooth. However, if the device is screen-locked, then this is not possible. Also, since Wi-Fi is now available in airplanes, some devices now have Wi-Fi access enabled in airplane mode.
An alternate solution is isolation of the phone through the use of Faraday bags, which block radio signals to or from the phone. Faraday bags contain materials that block external static electrical fields (including radio waves). Thus, Faraday bags shield seized mobile devices from external interference to prevent wiping and tracking. To work more conveniently with seized devices, Faraday tents and rooms also exist.
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- 網(wǎng)絡(luò)空間安全:管理者讀物
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- 黑客攻防入門秘笈
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- 數(shù)據(jù)安全領(lǐng)域指南
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- SQL Injection Strategies
- 無線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- 云計(jì)算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 大數(shù)據(jù)時(shí)代的云安全
- 防火墻和VPN技術(shù)與實(shí)踐
- Hack-A-Sat太空信息安全挑戰(zhàn)賽深度題解
- 從實(shí)踐中學(xué)習(xí)Fiddler Web應(yīng)用分析