- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 203字
- 2021-06-24 16:39:01
Securing the evidence
With advanced smartphone features such as Find My iPhone and remote wipes, securing a mobile phone in a way such that it cannot be remotely wiped is of great importance. Also, when the phone is powered on and has service, it constantly receives new data. To secure the evidence, use the right equipment and techniques to isolate the phone from all networks. With isolation, the phone is prevented from receiving any new data that would cause active data to be deleted. Depending on the case, other forensic techniques such as fingerprint matching may need to be employed to establish a connection between the device and its owner. If the device is not handled in a secure manner, physical evidence may be unintentionally tampered with and may be rendered useless.
It is also important to collect any peripherals, associated media, cables, power adapters, and other accessories that are present at the scene. At the scene of investigation, if the device is found to be connected to a personal computer, pulling it directly would stop the data transfer. Instead, it is recommended to capture the memory of the personal computer before pulling the device, as this contains significant details in many cases.
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 可信計(jì)算3.0工程初步
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- Instant Java Password and Authentication Security
- 無(wú)線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- 隱私計(jì)算:推進(jìn)數(shù)據(jù)“可用不可見”的關(guān)鍵技術(shù)
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- Mastering Linux Security and Hardening
- Mastering Metasploit
- Practical Internet of Things Security
- 黑客攻防入門
- 網(wǎng)絡(luò)入侵檢測(cè)系統(tǒng)原理與應(yīng)用
- CTF網(wǎng)絡(luò)安全競(jìng)賽入門教程
- 2023—2024年中國(guó)網(wǎng)絡(luò)安全發(fā)展藍(lán)皮書