Digital Forensics
Mobile Forensics
Mobile forensics can be defined as a subsection of digital forensics. Mobile forensics is therefore a part of digital forensics that analysis mobile devises to retrieve and recover data and digital evidence while investigating an electronic source. Generally, mobile forensics is a term used to describe the application of techniques and methods in respect to international guidelines and inspection of mobile devices. The purpose of the mobile forensics is preservation and likelihood of non-contamination of the condition of things. Mobile devices help to provide vital information from text messages and call logs to web search and also to locate data that indicates the location of the device owner at a given time
Difference between computer forensics and mobile forensics.
Computer forensics is different from mobile forensics. In computer forensics, the devices viewed are fixed storage devices meaning that we can find the same image whenever we need it. In mobile forensics, the devices that we view are complete dynamic system meaning that we can only extract the SMS, contacts and call logs even after supporting the mobile phone. However, calendars and any other information may not be extracted.
Mobile Device Attacks
In the modern world of the digital era, mobile network attack has increasingly rise. Many mobile phone devices have been targeted. Kaspersky detected nearly 3.5 million bits of malware in 2014 to more than a million devices. The number rose in 2017 and malicious threats reached 360,000 files per day. 78% of the files were noted to be malware programs hence, more than 280,000 files were detected every day. It is important to note that most of these attacks are for mobile devices and are increasing every day.
Challenges of Mobile Forensics.
When it comes to the mobile platform, forensic challenges follow along. One of the greatest challenge is that the data can be accessed, warehoused, and synchronized across various devices. Data is volatile hence can easily be deleted remotely or transformed (R and R,2019). Therefore, more effort is needed to preserve this data. Additionally, mobile device undertakes several hardware and software upgrades and many mobile dealers may push these upgrades. It becomes a challenge by adding flavors from various operating system. Another challenge is the different operation systems (M, S and M, 2016). For instance, Android and Feature Phone involves different Forensic technique and the mobile examiner should therefore use different techniques and tools to address the issue. Also, computer forensics and mobile phone forensic display unique challenges to the forensic examiner.
Mobile Forensic Tools.
Mobile forensic expert should be able to understand various types of forensic tools. The tools come in various groups (Nnoli, D and P, 2012). The system of Classifying tool offers the forensic analyst with a framework to access the techniques that different forensic tools have been used to capture data. Some of these categories include; network forensics, email analysis, file analysis, database forensics, digital image forensics among others. These categories give a perspective of what digital forensic tools are.
Comparative Analysis of iOS and Android
Over the years, iOS and Android have increasingly become similar, however, the basic difference of control and choice are important factors that makes their difference. Therefore, none of them is characteristically better and they are all extremely different (Palmer, 2019). It is important to note that the he difference between the two depends on the stability of the operating and apps system. Notably, both the Android and iOS use touch interfaces with so much in common. In our discussion this week, after comparing the difference between the Android and iOS, we realize that neither of the them is exceedingly better but Android is much superior than the iOS.
Conclusion
In conclusion, mobile forensics is a subsection of digital forensics that helps to retrieve and recover data. The mobile forensics help to preserve and prevent any likelihood of contamination of the data and other things.
References
M, Sahinoglu, et al. ” Metrics Based Risk Assessment and Management of Digital Forensics. Defense Acquisition .” A Publication of the Defense Acquisition University (2016): 152-177. http://eds.a.ebscohost.com/eds/detail/detail?vid=2&sid=557b2fab-0018-4331-9b58-0e88f42dcd45%40sdc-v-sessmgr03&bdata=JkF1dGhUeXBlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.8688020&db=edseee.
Nnoli, H, et al. “The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches,” International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social (2012): 734-741. http://eds.a.ebscohost.com/eds/detail/detail?vid=1&sid=971b5f7e-2e90-41e7-93e6-d90826c96ce6%40sessionmgr4006&bdata=JkF1dGhUeXBlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#db=a9h&AN=114851839.
Palmer, Danny. “Mobile malware attacks are booming in 2019: These are the most common threats.” (2019). https://www.zdnet.com/article/mobile-malware-attacks-are-booming-in-2019-these-are-the-most-common-threats/.
R, Montasari and Hill R. “Next-Generation Digital Forensics: Challenges and Future Paradigms.” IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), Global Security, Safety and Sustainability (ICGS3) (2019): 205. http://eds.a.ebscohost.com/eds/detail/detail?vid=2&sid=557b2fab-0018-4331-9b58-0e88f42dcd45%40sdc-v-sessmgr03&bdata=JkF1dGhUeXBlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=edseee.8688020&db=edseee.