logo

CO4516 Mobile Device Investigation

   

Added on  2022-08-29

15 Pages2750 Words18 Views
CO4516 Mobile
Device Investigation
[Type the author name]
[Pick the date]

Contents
Introduction................................................................................................................ 3
Logical, File System as well as Physical extraction methods afforded by the
Cellebrite UFED4PC and Cellebrite Physical Analyzer software..................................3
Logical extraction.................................................................................................... 4
Strength............................................................................................................... 5
Weakness............................................................................................................. 5
Physical Extraction.................................................................................................. 5
Strength............................................................................................................... 5
Weakness............................................................................................................. 5
File System Extraction............................................................................................. 6
Strength............................................................................................................... 6
Weakness............................................................................................................. 6
The role that proportionality plays in selecting the evidence extraction method for
mobile devices........................................................................................................... 6
Process Model for the Forensic Investigation of Mobile Devices.................................8
Conclusion................................................................................................................ 10
References............................................................................................................... 12
Appendix.................................................................................................................. 13

Introduction
Mobile forensics is a necessary field in today's society. Over the years the technology has
improved as well as expanded the function of a mobile phone to the likes of carrying a small
computer around in your pocket. A handheld device of the 80s, as well as today's mini-
computers, still use radio signals to communicate with towers that provide a signal over a wide
area (network). There are two dominant networks in use today among other smaller common
networks. Each network follows its own distinct set of rules (protocols) as well as are
incompatible with each other
Logical, File System as well as Physical extraction methods
afforded by the Cellebrite UFED4PC and Cellebrite
Physical Analyzer software
The UFED Ultimate provides market-leading digital device access as well as outstanding
capabilities to extract as well as decode all ounce data. Not only does it thoroughly investigate
logical file systems as well as physically extracted data, but it does it thoroughly, discovers
important evidence, as well as easily shares findings with the entire research team. With UFED
Ultimate, you can expose hidden evidence on popular social media sites as well as provide more
evidence as well as deeper insight. Continuous software updates, as well as support across a
variety of hardware platforms, enable teams to use the most advanced digital forensic checking
capabilities when as well as where they need it (Andrei and Calder, 2018).
There are two distinct techniques for information extraction for cell phones: coherent just as
physical. (The third extraction type, File System Extraction, is ordered into the Logical heading.)
If upheld by the gadget, you can utilize various information types from every extraction class, as
appeared in the accompanying outline. Much of the time, a cell phone is associated with a UFED
gadget through a USB link association that speaks with the telephone to separate information. A
USB association gives a demonstrated, solid channel for duplicating information from a proof
gadget to a criminological picture. Contingent upon the OS of the cell phone you are keen on, the
intelligent extraction may utilize the USB/Bluetooth convention API rather, or the sequential
convention on more seasoned gadgets. The administrator must record the association type
utilized for every extraction. In uncommon cases, if the extraction comes up short, the client

must begin the extraction once more. The disappointment just influences the sending of
information from the gadget, just as doesn't influence the quality or respectability of the proof
information, as it doesn't influence the information on the gadget (Lipman, 2017).
Source - (Lipman, 2017)
Logical extraction
Logical data extraction is most often performed through a specified application
programming interface (API), available from the device vendor.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Developments in Mobile Device Evidence and Investigation
|16
|3343
|98

Mobile Device Investigation | Report
|10
|2292
|16

Digital Forensic Technology: Evidence Recovery and Future Challenges
|8
|2390
|82

Digital Forensic: An Overview of the Application, Tools, and Future
|12
|572
|328

Evaluating Digital Forensic Options for iPad
|17
|6364
|25

Computer Forensics: A Digital Forensic Methodology for Crime Evidence
|18
|4740
|423