- Practical Mobile Forensics(Second Edition)
- Heather Mahalik Rohit Tamma Satish Bommisetty
- 405字
- 2021-07-16 10:55:48
Good forensic practices
Good forensic practices apply to the collection and preservation of evidence. Following good forensic practices ensures that evidence will be accepted in a court as being authentic and accurate. Modification of evidence, either intentionally or accidentally, can affect the case. So, understanding the best practices is critical for forensic examiners.
Securing the evidence
With advanced smartphone features such as Find My iPhone and remote wipes, securing a mobile phone in a way that it cannot be remotely wiped is of great importance. Also, when the phone is powered on and has service, it constantly receives new data. To secure the evidence, use the right equipment and techniques to isolate the phone from all networks. With isolation, the phone is prevented from receiving any new data that would cause active data to be deleted.
Preserving the evidence
As evidence is collected, it must be preserved in a state that is acceptable in court. Working directly on the original copies of evidence might alter it. So, as soon as you recover a raw disk image or files, create a read-only master copy and duplicate it. In order for evidence to be admissible, there must be a method to verify that the evidence presented is exactly the same as the original collected. This can be accomplished by creating a hash value of the image. After duplicating the raw disk image or files, compute and verify the hash values for the original and the copy to ensure that the integrity of the evidence is maintained. Any changes in hash values should be documented and explainable. All further processing or examination should be performed on copies of the evidence. Any use of the device might alter the information stored on the handset. So, only perform the tasks that are absolutely necessary.
Documenting the evidence
Ensure that you document all the methods and tools that are used to collect and extract the evidence. Detail your notes so that another examiner can reproduce them. Your work must be reproducible; if not, a judge may rule it inadmissible.
Documenting all changes
It's important to document the entire recovery process, including all the changes made during the acquisition and examination. For example, if the forensic tool used for the data extraction sliced up the disk image to store it, this must be documented. All changes to the mobile device, including power cycling and syncing, should be documented in your case notes.
- Extending Symfony2 Web Application Framework
- Enterprise Cloud Security and Governance
- 工業(yè)物聯(lián)網(wǎng)安全
- 黑客攻防與無線安全從新手到高手(超值版)
- Testing and Securing Android Studio Applications
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- SQL Injection Strategies
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 云計(jì)算安全防護(hù)技術(shù)
- INSTANT Kali Linux
- 黑客攻防入門
- Kali Linux無線網(wǎng)絡(luò)滲透測(cè)試詳解
- Metasploit 5.0 for Beginners
- 網(wǎng)絡(luò)空間安全體系
- Web前端黑客技術(shù)揭秘