0

Practical Forensic Analysis of Artifacts on iOS and Android Devices

eBook - Investigating Complex Mobile Devices

Erschienen am 15.04.2022, 1. Auflage 2022
73,95 €
(inkl. MwSt.)

Download

E-Book Download
Bibliografische Daten
ISBN/EAN: 9781484280263
Sprache: Englisch
Umfang: 515 S., 20.59 MB
E-Book
Format: PDF
DRM: Digitales Wasserzeichen

Beschreibung

Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings. 
Youll walkthrough the various phases of the mobile forensics process for both Android and iOS-based devices, including forensically extracting, collecting, and analyzing data and producing and disseminating reports. Practical cases and labs involving specialized hardware and software illustrate practical application and performance of data acquisition (including deleted data) and the analysis of extracted information. You'll also gain an advanced understanding of computer forensics, focusing on mobile devices and other devices not classifiable as laptops, desktops, or servers. 
This book is your pathway to developing the critical thinking, analytical reasoning, and technical writing skills necessary to effectively work in a junior-level digital forensic or cybersecurity analyst role.  
What You'll LearnAcquire and investigate data from mobile devices using forensically sound, industry-standard tools
Understand the relationship between mobile and desktop devices in criminal and corporate investigations
Analyze backup files and artifacts for forensic evidenceWho This Book Is For
Forensic examiners with little or basic experience in mobile forensics or open source solutions for mobile forensics. The book will also be useful to anyone seeking a deeper understanding of mobile internals.

Autorenportrait

Mohammed Moreb,Ph.D. in Electrical and Computer Engineering. Expertise in Cybercrimes& Digital Evidence Analysis, specifically focusing on Information and Network Security, with a strong publication track record, work for both conceptual and practical wich built during works as a system developer and administrator for the data center for more than 10 years, config, install, and admin enterprise system related to all security configuration, he improved his academic path with the international certificate such as CCNA, MCAD, MCSE; Academically he teaches the graduate-level courses such as Information and Network Security course, Mobile Forensics course, Advanced Research Methods, Computer Network Analysis and Design, and Artificial Intelligence Strategy for Business Leaders.

Dr. Moreb recently founded a new framework and methodology specialized in software engineering for machine learning in health informatics named SEMLHI which investigates the interaction between software engineering and machine learning within the context of health systems. The SEMLHI framework includes four modules (software, machine learning, machine learning algorithms, and health informatics data) that organize the tasks in the framework using a SEMLHI methodology, thereby enabling researchers and developers to analyze health informatics software from an engineering perspective and providing developers with a new road map for designing health applications with system functions and software implementations.


Inhalt

Chapter 1: Introduction to Mobile Forensic Analysis.- Chapter 2: Introduction to IOS Forensics.- Chapter 3: Introduction to Android Forensics.- Chapter 4: Forensic Investigations of Popular Applications on Android and iOS platforms.- Chapter 5: Forensic Analysis of Telegram Messenger on iOS and Android Smartphones Case Study.- Chapter 6: Detecting Privacy Leaks Utilizing Digital Forensics and Reverse Engineering Methodologies.Chapter 7: Impact of Device Jailbreaking or Rooting on User Data Integrity in Mobile Forensics.- Chapter 8: The Impact of Cryptocurrency Mining on Mobile Devices.- Chapter 9: Mobile Forensic Investigation for WhatsApp.- Chapter 10: Cloud Computing Forensics: Dropbox Case Study.- Chapter 11: Malware Forensics for Volatile and nonVolatile Memory in Mobile Devices.- Chapter 12: Mobile Forensic for KeyLogger Artifact.- Chapter 13: Evidence Identification Methods for Android and iOS Mobile Devices with Facebook Messenger.- Chapter 14: Mobile Forensics for IOS and Android platforms: Chrome app artifacts depending on SQLite.

Informationen zu E-Books

„E-Book“ steht für digitales Buch. Um diese Art von Büchern lesen zu können wird entweder eine spezielle Software für Computer, Tablets und Smartphones oder ein E-Book Reader benötigt. Da viele verschiedene Formate (Dateien) für E-Books existieren, gilt es dabei, einiges zu beachten.
Von uns werden digitale Bücher in drei Formaten ausgeliefert. Die Formate sind EPUB mit DRM (Digital Rights Management), EPUB ohne DRM und PDF. Bei den Formaten PDF und EPUB ohne DRM müssen Sie lediglich prüfen, ob Ihr E-Book Reader kompatibel ist. Wenn ein Format mit DRM genutzt wird, besteht zusätzlich die Notwendigkeit, dass Sie einen kostenlosen Adobe® Digital Editions Account besitzen. Wenn Sie ein E-Book, das Adobe® Digital Editions benötigt herunterladen, erhalten Sie eine ASCM-Datei, die zu Digital Editions hinzugefügt und mit Ihrem Account verknüpft werden muss. Einige E-Book Reader (zum Beispiel PocketBook Touch) unterstützen auch das direkte Eingeben der Login-Daten des Adobe Accounts – somit können diese ASCM-Dateien direkt auf das betreffende Gerät kopiert werden.
Da E-Books nur für eine begrenzte Zeit – in der Regel 6 Monate – herunterladbar sind, sollten Sie stets eine Sicherheitskopie auf einem Dauerspeicher (Festplatte, USB-Stick oder CD) vorsehen. Auch ist die Menge der Downloads auf maximal 5 begrenzt.

Weitere Artikel vom Autor "Moreb, Mohammed"

Alle Artikel anzeigen