Digital Forensics Report: iDevice and Kik Messenger Analysis

Verified

Added on  2022/08/29

|7
|1078
|34
Report
AI Summary
This report delves into the realm of digital forensics, examining three key articles related to the field. The first article, by Ovens & Morison (2016), investigates the forensic analysis of Kik Messenger on iOS devices, exploring artifact creation and modification. The second article, by Hay et al. (2011), evaluates digital forensic options for the Apple iPad, discussing available tools and methodologies, including jailbreaking. The third article, by Ahmed, Khalid & Aslam (2014), focuses on iDevice forensics and data integrity, comparing data obtained from OS utilities, freeware, and commercial tools. The report highlights the importance of data integrity in forensic investigations, particularly in the context of iDevices, and the challenges of accessing and analyzing data from these devices. It emphasizes the need for tools and techniques to ensure the admissibility of findings in legal settings.
Document Page
Running head: DIGITAL FORENSICS AND INVESTIGATION
DIGITAL FORENSICS AND INVESTIGATION
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1DIGITAL FORENSICS AND INVESTIGATION
Article 1:-
Kik messenger is a newly presented immediate application for messaging that has
develop very common in a short time, particularly among new operators. The objective of this
article Ovens & Morison, (2016)1 existed to determine and information artifacts formed or
adapted by Kik messenger on tools launched with the newest iOS versions. In this article applied
an artificial situation where social media chat (Facebook and whatsapp) objects initiate on an
iOS device delivered key indication in a police inquiry. The researcher of this paper Ovens &
Morison, (2016)1 also defines another researcher’s thoughts and develops some extraordinary
concepts about the KiK messengers.
This article Ovens & Morison, (2016)1 was to classify, discover and examine objects
modified or formed by this application to respond to the distinctive interrogations tackled by
forensic detectives in their works to resolve corruptions. The researcher provides a table that
explains some famous software versions, use, and developer, which can be essential for digital
forensic inquiry. The forensic analysis states that this application applies a client-server idea with
Kik’s networks transmitting the statements between operators, keeping operator profiles for
searching and indexing, as well as validating operators to their profiles in the login time.
This article concentrated on the retrieval of artifacts connecting to the application of
“Kik” on operating systems. It accepted where objects of attention could be established on the
model, as well as standby documents on the processors. Future research will determine that this
Document Page
2DIGITAL FORENSICS AND INVESTIGATION
application is not only used for Ovens & Morison, (2016)1 iOS. It was also applicable for
android and windows operating systems.
Article 2:-
Apple iPad is one of the conventional devices for young generation people. This research
is defining the option of digital forensic on this iPad. This research Hay et al., (2011)2 examines
the apparatuses and approaches available for directing forensic inspections of the Apple iPad.
These contain valuable software goods, updated approaches established on current jail-breaking
procedures, and the investigation of the device holdup contents delivered by iTunes. This article
creates four assistances in the mobile forensics field.
This paper is describing the mobilize concept, and this concept defines that mobilize the
black Light Forensic Collection, which delivers graphical evidence in an instinctive and prepared
fashion. This paper Hay et al., (2011)2 has also certified the inspecting of a partial selection of
iPad documents. The mobilize techniques are very flexible and coded by the HTML algorithm.
According to this researcher assumption, the mobile is of rising attention to digital forensic
inspectors because of their growing universality and evidentiary prospects.
This article has concentrated on the iPad, a crucial family member of mobile hardware
that applies Apple’s operating system. It has also analyzed standing methods and tools for
forensic replication and media investigation Hay et al., (2011)2. The difficulty of this researcher
is to find unlimited access to the iPad so that it can be imaged entirely without trusting on
1 Ovens & Morison, (2016)
2 Hay et al., (2011)
Document Page
3DIGITAL FORENSICS AND INVESTIGATION
firmware attacks or helps from Apple. So the future research should determine the optional
security measurement if this device. This research should be creating a good impact when
showing forensic inspections.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4DIGITAL FORENSICS AND INVESTIGATION
Article 3:-
Data Integrity and i-device forensic are very much relatable situations for the current
times. Research state that in current time the iPad is the most usable device. Data integrity is a
dynamic division of digital forensics that should be confirmed for the suitability of a law court.
This research paper Ahmed, Khalid & Aslam, (2014)3 has exposed that on one point, the
freeware apparatuses, under express condition, also keep data integrity as their profitable
counterparts. According to this paper, the reader also knows that the marketable tools, under the
particular situation, also create data integrity uncertain as generally assumed for freeware
apparatuses.
The principal aim of this article Ahmed, Khalid & Aslam, (2014)3 was to relate data
validity found from the OS utility and freeware is to the information also obtained from the
marketable tool. Another characteristic of this study was to recognize attractive decorations in
sequential extractions. These sequential extractions were executed on i-Device, applying a
marketable tool. The research effort also dedicated to accepting the remarkable forensic designs
in the actions of a locked source marketable tool applying the second exploration technique.
This paper has deliberated simple methods to reach a similar division of i-Device’s
objects, which the user can get from a marketable tool. The research results can be applied by a
forensic inspector to select a suitable tool for data withdrawal, keeping in interpreted the
necessities. This study Ahmed, Khalid & Aslam, (2014)3 did not examine the jail-breaking
technique. It will be exciting to execute a jail-breaking acquisition method on this device and
3 Ahmed, Khalid & Aslam, (2014)
Document Page
5DIGITAL FORENSICS AND INVESTIGATION
link this with a valuable tool to regulate the data integrity level, which can be found through the
jail-breaking method.
Document Page
6DIGITAL FORENSICS AND INVESTIGATION
References:-
Ahmed, M. J., Khalid, U., & Aslam, B. (2014, December). iDevice forensics-Data integrity. In
17th IEEE International Multi Topic Conference 2014 (pp. 260-265). IEEE.
Hay, A., Krill, D., Kuhar, B., & Peterson, G. (2011, January). Evaluating digital forensic options
for the apple ipad. In IFIP International Conference on Digital Forensics (pp. 257-273).
Springer, Berlin, Heidelberg.
Ovens, K. M., & Morison, G. (2016). Forensic analysis of kik messenger on ios devices. Digital
Investigation, 17, 40-52.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]