- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 270字
- 2021-06-24 16:38:59
Mobile forensic tool leveling system
Mobile phone forensic acquisition and analysis involves manual effort and the use of automated tools. There are a variety of tools that are available for performing mobile forensics. All the tools have their pros and cons, and it is fundamental that you understand that no single tool is sufficient for all purposes. So, understanding the various types of mobile forensic tools is important for forensic examiners.
When identifying the appropriate tools for the forensic acquisition and analysis of mobile phones, a mobile device forensic tool classification system developed by Sam Brothers (shown in the following diagram) comes in handy for examiners:
The objective of the mobile device forensic tool classification system is to enable an examiner to categorize forensic tools based on the examination methodology of the tool. As you move from the bottom of the pyramid to the top, the methods and tools used for analysis generally become more technical and sophisticated and require longer analysis times. There are advantages and disadvantages of different techniques used at each layer. The forensic examiner should be aware of these issues before he or she applies a particular technique. Evidence can be destroyed completely if the given method or tool is not properly utilized. This risk increases as you move up in the pyramid. Thus, proper training is required to obtain the highest success rate in data extraction from mobile devices.
Each existing mobile forensic tool can be classified under one or more of the five levels. The following sections contain a detailed description of each level.
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 工業(yè)互聯(lián)網(wǎng)安全防護與展望
- 黑客攻防入門秘笈
- Mastering Kali Linux for Advanced Penetration Testing
- Preventing Digital Extortion
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實踐指南
- 網(wǎng)絡(luò)空間安全實驗
- 計算機網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 可信計算3.0工程初步(第二版)
- 數(shù)據(jù)安全領(lǐng)域指南
- 華為防火墻實戰(zhàn)指南
- SQL Injection Strategies
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 網(wǎng)絡(luò)攻防實戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- 黑客攻防從入門到精通:命令版