logo

Digital Forensic Technology: Evidence Recovery and Challenges

   

Added on  2023-01-11

10 Pages2858 Words94 Views
CO4514 Digital Forensic
Technology
Your G Number
Assignment One

Digital Desktop
1. Introduction
This report aims to discuss the aspects of the digital forensic technology
by considering the case study provided in the appendix, about Zohra
Bloggs. A discussion of the use of the digital technology is provided in this
report. The considered case study is the Zohra Bloggs situation where she
is the undergraduate student at University of the Central Lancashire and
she is pursuing BSc multimedia development. She carried the iPhone 4s
mobile phone along with her. The main purpose of using this phone is to
stay in touch with the family and friends through text messages, phone
calls, iMessage and the using Skype. She also utilises this device for
listening music that could be downloaded by her from the Apple iTunes.
She also possess the Samsung Galaxy Tab 3 as her tablet device as it
provides the ability of sharing any data with the mobile phone. This case
study is analysed and the assessed for understanding the potential crimes
or any kind of digital evidence that could be recovered.

2. My Digital Technology
N
o
Device Justification Crime Available Evidence
1 Zohra Bloggs is the
undergraduate student
at University of the
Central Lancashire and
she is pursuing BSc
multimedia
development. She
carried the iPhone 4s
mobile phone along
with her.
Apple products provide the
enhanced reliability and
security.
The crimes that could be
committed using the iOS
platform is the creation of
malware embedded
applications and place it in
the app store that could be
downloaded by the users and
it would lead to the seize of
the contents and the data on
the phone by the malicious
users (Baig et al. 2017). It
could lead to seize or even
delete the contents on the
iPhone.
The kind of applications that
are used for executing this
attack leaves a digital trail of
the files shortcut that could
be used a digital evidence of
the attack (Cao et al. 2014).
The name of the malware is
the XcodeGhost that is
originated from the malicious
version of the Xcode that is
the official tool for
developing the iOS and apps
(Chabot et al. 2014).
2 The main purpose of
using this phone is to
stay in touch with the
family and friends
through text messages,
phone calls, iMessage
and the using Skype.
She also utilises this
device for listening
music that could be
downloaded by her from
the Apple iTunes.
Skype provides the better
quality video conferencing
platform without any lags or
glitches
Skype could be used for
accessing the webcam
illegally and gain some
explicit videos.
Evidence is the log file on the
computer and the software
logs about the calls.
3 She also possess the
Samsung Galaxy Tab 3
as her tablet device as
it provides the ability of
Tablet are easy to handle
and customised for personal
use.
Tablet could be used for
hacking any electronic
equipment.
IP address of the device that
is used for hacking could be
trailed for discovering the
attacker source (Conlan,

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensic Technology: A Detailed Description and Application in Crime Investigation
|9
|2624
|71

Forensic analysis of Kik messenger on iOS devices
|15
|11413
|45