- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 249字
- 2021-06-24 16:38:58
The documenting and reporting phase
The forensic examiner is required to document, throughout the examination process, everything related to what was done during acquisition and examination. Once you complete the investigation, the results must go through some form of peer review to ensure that the data is checked and the investigation is complete. Your notes and documentation may include information such as the following:
- The examination start date and time
- The physical condition of the phone
- Photos of the phone and individual components
- Phone status when received—turned on or turned off
- Phone make and model
- Tools used for the acquisition
- Tools used for the examination
- Data found during the examination
- Notes from peer review
Throughout the investigation, it is important to make sure that the information extracted and documented from a mobile device can be clearly presented to any other examiner or to a court. Documentation is one of your most important skills. Creating a forensic report of data extracted from a mobile device during acquisition and analysis is important. This may include data in both paper and electronic format.
Your findings must be documented and presented in a manner that means that the evidence speaks for itself when in court. The findings should be clear, concise, and repeatable. Timeline and link analysis, features offered by many commercial mobile forensic tools, will aid in reporting and explaining findings across multiple mobile devices. These tools allow you to tie together the methods behind the communication of multiple devices.
- 網絡安全與管理
- 計算機網絡安全技術(第6版·慕課版)
- Metasploit Penetration Testing Cookbook(Second Edition)
- Kali Linux Network Scanning Cookbook(Second Edition)
- 模糊測試:強制發掘安全漏洞的利器
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- Kerberos域網絡安全從入門到精通
- 數據保護:工作負載的可恢復性
- INSTANT Apple Configurator How-to
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Bug Bounty Hunting Essentials
- CTF快速上手:PicoCTF真題解析(Web篇)
- 網絡空間安全實戰基礎
- 5G網絡安全規劃與實踐
- Developing Applications with Salesforce Chatter