Du er ikke logget ind
Beskrivelse
Chapter 1
Introduction to Mobile Forensic Analysis
The Importance of Mobile Forensic AnalysisUnderstanding mobile forensicsChallenges in mobile forensicsTools used for mobile forensicsThe mobile phone evidence extraction processExamination and analysisRules of evidencePractical Mobile ForensicSummaryChapter 2
Introduction to IOS Forensics
IOS Boot ProcessIOS Architecture IOS Security Understanding JailbreakingData Acquisition from iOS DevicesData Acquisition from iOS BackupsiOS Data Analysis and RecoveryMobile Forensics Investigation Challenges on iOS iOS Forensic ToolsSummary
Chapter 3
Introduction to Android Forensics
Understanding AndroidApplication frameworkAndroid runtimeLinux KernelAndroid Forensic Setup and Pre-Data Extraction TechniquesAndroid Data Extraction TechniquesAndroid Data Analysis and RecoveryAndroid App rooting process and techniques SummaryChapter 4
Forensic Investigations of Popular Applications on Android and iOS platforms
IntroductionCase & Investigator DetailsInvestigations of Facebook Messenger and WhatsApp applicationsDetails of the device seized for examinationResults and AnalysisSummaryChapter 5
Forensic Analysis of Telegram Messenger on iOS and Android Smartphones Case Study
IntroductionLiterature ReviewMethodology and Experiment SetupEvidences AcquisitionEvidences Processing and AnalysisResultsSummaryChapter 6
Detecting Private Data Leaks Over Mobile Applications Using Mobile Forensic Techniques
IntroductionLegal Issues Regarding the Local Electronic Crimes Law & Mobile Forensics Details of the reporting agency and tools used in the examinationDescription of steps taken during examination Chain of custody documentation Details of findings or issues identifiedEvidence recovered during the examination, ranging from chat messages Images captured during the examinationExamination and analysis informationSummary
Chapter 7
Impact of iPhone Jailbreaking on User Data Integrity in Mobile Forensics
Introduction
Mobile Forensics
User Data Integrity in Mobile Forensics
Jailbreaking's affect on iOS
Data acquisition
Logical acquisition
Filesystem acquisition
Experiment Details and Tools
Results
Data Extraction
Extracted data before jailbreak
Extracted data after jailbreak
Summary
Chapter 8
The Impact of Cryptocurrency Mining on Mobile Devices
Introduction Cryptocurrency miningMeasurement and work mechanismTools, programs, and applications used in cryptocurrency miningExperiment and analogy by iPhone 6sExperiment and analogy by LG g5Results and AnalysisSummaryChapter 9
Mobile Forensic Investigation for WhatsApp<