- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 150字
- 2021-06-24 16:38:56
The mobile phone evidence extraction process
Evidence extraction and the forensic examination of different mobile devices may differ based on various factors. However, following a consistent examination process will help the forensic examiner to ensure that the evidence gathered from each phone is well documented and that the results are reliable. There is no well-established standard process for mobile forensics.
However, the following diagram provides an overview of process considerations for the extraction of evidence from mobile devices. All methods used when extracting data from mobile devices should be tested, validated, and well documented:
As shown in the preceding diagram, forensics on a mobile device includes several phases, from the evidence intake phase to the archiving phase. The following sections provide an overview of various considerations across all the phases.
- 云原生安全:攻防實踐與體系構建
- 腦洞大開:滲透測試另類實戰攻略
- 特種木馬防御與檢測技術研究
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 深入淺出隱私計算:技術解析與應用實踐
- .NET安全攻防指南(上冊)
- Computer Forensics with FTK
- Kerberos域網絡安全從入門到精通
- 學電腦安全與病毒防范
- Web安全之深度學習實戰
- INSTANT Kali Linux
- Practical Mobile Forensics
- Securing Network Infrastructure
- Instant OSSEC Host-based Intrusion Detection System
- Hands-On Bug Hunting for Penetration Testers