- Practical Mobile Forensics(Second Edition)
- Heather Mahalik Rohit Tamma Satish Bommisetty
- 156字
- 2021-07-16 10:55:48
Summary
Mobile devices store a wide range of information such as SMS, call logs, browser history, chat messages, location details, and so on. Mobile device forensics includes many approaches and concepts that fall outside of the boundaries of traditional digital forensics. Extreme care should be taken while handling the device right from evidence intake phase to archiving phase. Examiners responsible for mobile devices must understand the different acquisition methods and the complexities of handling the data during analysis. Extracting data from a mobile device is half the battle. The operating system, security features, and type of smartphone will determine the amount of access you have to the data. It is important to follow sound forensic practices and make sure that the evidence is unaltered during the investigation.
The next chapter will provide insight to iOS forensics. You will learn about the file system layout, security features, and the way files are stored on the iOS device.
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- Mobile Forensics Cookbook
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 黑客攻防技巧
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- Enterprise Cloud Security and Governance
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 安全技術(shù)運(yùn)營:方法與實(shí)踐
- 計(jì)算機(jī)病毒原理與防范(第2版)
- Testing and Securing Android Studio Applications
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- CTF特訓(xùn)營:技術(shù)詳解、解題方法與競賽技巧
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- Learning Pentesting for Android Devices
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager