官术网_书友最值得收藏!

  • Practical Mobile Forensics
  • Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
  • 203字
  • 2021-06-24 16:39:01

Securing the evidence

With advanced smartphone features such as Find My iPhone and remote wipes, securing a mobile phone in a way such that it cannot be remotely wiped is of great importance. Also, when the phone is powered on and has service, it constantly receives new data. To secure the evidence, use the right equipment and techniques to isolate the phone from all networks. With isolation, the phone is prevented from receiving any new data that would cause active data to be deleted. Depending on the case, other forensic techniques such as fingerprint matching may need to be employed to establish a connection between the device and its owner. If the device is not handled in a secure manner, physical evidence may be unintentionally tampered with and may be rendered useless.

It is also important to collect any peripherals, associated media, cables, power adapters, and other accessories that are present at the scene. At the scene of investigation, if the device is found to be connected to a personal computer, pulling it directly would stop the data transfer. Instead, it is recommended to capture the memory of the personal computer before pulling the device, as this contains significant details in many cases.

主站蜘蛛池模板: 师宗县| 尼勒克县| 集贤县| 拉萨市| 莎车县| 墨竹工卡县| 柳州市| 乌兰县| 长治县| 香港| 肥乡县| 科尔| 高邑县| 舞阳县| 长兴县| 贵南县| 杂多县| 巢湖市| 平昌县| 伊金霍洛旗| 乌海市| 和静县| 海城市| 红桥区| 千阳县| 朝阳区| 银川市| 永善县| 溧阳市| 大港区| 鸡西市| 远安县| 惠安县| 南郑县| 安宁市| 大埔县| 吉木乃县| 兴仁县| 吉首市| 军事| 湖口县|