- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 227字
- 2021-06-24 16:38:58
The processing phase
Once a phone has been isolated from communication networks, the actual processing of the mobile phone begins. One of the challenges that you will face in this phase is identifying which tools to use, as this is affected by a variety of factors such as price, ease of use, applicability, and so on. Mobile forensic software is highly expensive, and unlike with computer forensics, you may sometimes have to use multiple tools to access data. While selecting a tool, ensure that it has built-in features to maintain forensic integrity. Maintaining forensic integrity requires a tool that packages collected data in a format that probably cannot be easily modified or altered.
The phone should be acquired using a tested method that is repeatable and is as forensically sound as possible. Physical acquisition is the preferred method as it extracts the raw memory data and the device is commonly powered off during the acquisition process. On most devices, the smallest number of changes occur to the device during physical acquisition. If physical acquisition is not possible or fails, an attempt should be made to acquire the filesystem of the mobile device. A logical acquisition should always be performed as it may contain only the parsed data and provide pointers to examine the raw memory image. These acquisition methods are discussed in detail in later chapters.
- 開發者的Web安全戒律:真實威脅與防御實踐
- 黑客攻防入門秘笈
- Penetration Testing with Perl
- Web安全與攻防入門很輕松(實戰超值版)
- Preventing Digital Extortion
- Applied Network Security
- 網絡空間安全實驗
- Kerberos域網絡安全從入門到精通
- Instant Java Password and Authentication Security
- 人工智能安全(精裝版)
- 數據保護:工作負載的可恢復性
- 電腦安全與攻防入門很輕松(實戰超值版)
- 構建新型網絡形態下的網絡空間安全體系
- Securing Network Infrastructure
- 一本書讀透金融科技安全