- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 270字
- 2021-06-24 16:38:59
Mobile forensic tool leveling system
Mobile phone forensic acquisition and analysis involves manual effort and the use of automated tools. There are a variety of tools that are available for performing mobile forensics. All the tools have their pros and cons, and it is fundamental that you understand that no single tool is sufficient for all purposes. So, understanding the various types of mobile forensic tools is important for forensic examiners.
When identifying the appropriate tools for the forensic acquisition and analysis of mobile phones, a mobile device forensic tool classification system developed by Sam Brothers (shown in the following diagram) comes in handy for examiners:
The objective of the mobile device forensic tool classification system is to enable an examiner to categorize forensic tools based on the examination methodology of the tool. As you move from the bottom of the pyramid to the top, the methods and tools used for analysis generally become more technical and sophisticated and require longer analysis times. There are advantages and disadvantages of different techniques used at each layer. The forensic examiner should be aware of these issues before he or she applies a particular technique. Evidence can be destroyed completely if the given method or tool is not properly utilized. This risk increases as you move up in the pyramid. Thus, proper training is required to obtain the highest success rate in data extraction from mobile devices.
Each existing mobile forensic tool can be classified under one or more of the five levels. The following sections contain a detailed description of each level.
- 攻守道:企業數字業務安全風險與防范
- Android應用安全實戰:Frida協議分析
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 網絡安全保障能力研究
- 零信任網絡:在不可信網絡中構建安全系統
- 深入淺出隱私計算:技術解析與應用實踐
- 計算機病毒分析與防范大全(第3版)
- 計算機病毒原理與防范(第2版)
- 軟件開發安全之道:概念、設計與實施
- Computer Forensics with FTK
- ARM匯編與逆向工程:藍狐卷·基礎知識
- 網絡安全能力成熟度模型:原理與實踐
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 網絡安全與攻防入門很輕松(實戰超值版)
- 數字銀行安全體系構建