- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 203字
- 2021-06-24 16:39:01
Securing the evidence
With advanced smartphone features such as Find My iPhone and remote wipes, securing a mobile phone in a way such that it cannot be remotely wiped is of great importance. Also, when the phone is powered on and has service, it constantly receives new data. To secure the evidence, use the right equipment and techniques to isolate the phone from all networks. With isolation, the phone is prevented from receiving any new data that would cause active data to be deleted. Depending on the case, other forensic techniques such as fingerprint matching may need to be employed to establish a connection between the device and its owner. If the device is not handled in a secure manner, physical evidence may be unintentionally tampered with and may be rendered useless.
It is also important to collect any peripherals, associated media, cables, power adapters, and other accessories that are present at the scene. At the scene of investigation, if the device is found to be connected to a personal computer, pulling it directly would stop the data transfer. Instead, it is recommended to capture the memory of the personal computer before pulling the device, as this contains significant details in many cases.
- Web漏洞分析與防范實戰:卷1
- 大型互聯網企業安全架構
- 特種木馬防御與檢測技術研究
- 信息系統安全檢測與風險評估
- Web安全與攻防入門很輕松(實戰超值版)
- Enterprise Cloud Security and Governance
- 工業控制網絡安全技術
- 諸神之眼:Nmap網絡安全審計技術揭秘
- 網絡空間安全實驗
- Kerberos域網絡安全從入門到精通
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 功能型密碼算法設計與分析
- 物聯網信息安全技術
- Real-World SRE