Emerging Trends and Solutions in Mobile Digital Forensics
VerifiedAdded on 2023/01/23

[BY NAME]
[INSTITUIONAL AFFLIATION]
[DATE]
Paraphrase This Document

• Introduction
• Background
• Methodology
• Conclusion
• Future

• IoT devices are on rise
• Advent of Micro processors
• Advent of Micro sensors
• Security issues have risen due to IoT
You're viewing a preview
Unlock full access by subscribing today!

• More micro services led to IoT
• Security loopholes have been reported in IoT
• More attacks have led to forensic
investigations
• No forensic tools are based on IoT
Proposed solution provides forensic tools based
on IoT
Paraphrase This Document

• Review of literature
• Analysis of current trends in IoT devices
• Proposed solution analysis
• Representation of results

• IoT devices digital forensics practical
analysis
• Using Open source IoT software's for
forensic investigations
• Results Analysis and Explanation of
Outcomes
You're viewing a preview
Unlock full access by subscribing today!

• IoT security is an Issue
• Current approaches don’t include digital
forensic tools based on IoT
• Proposed solution provides better
investigative capacities for IoT
Paraphrase This Document

• Integrating the model with IoT devices
• Increasing more research on efficient
models for IoT digital forensics

• More research to be done on IoT forensic
investigation
• Integration of Forensic investigation
capability onto IoT
You're viewing a preview
Unlock full access by subscribing today!

Environment
[BY NAME]
[INSTITUIONAL AFFLIATION]
[DATE]
Paraphrase This Document

• Introduction
• Background
• Methodology
• Conclusion
• Future

• IoT devices are on rise
• Advent of Micro processors
• Advent of Micro sensors
• Security issues have risen due to IoT devices
• Connected smart offices have since been
target for digital investigations
You're viewing a preview
Unlock full access by subscribing today!

• The advent of IoT have led to establishment of
smart environed
• These environment have constant security
issues
• Current approach to provide digital forensics
have failed
Paraphrase This Document

• Review of literature
• Analysis of current trends in IoT devices
• Proposed solution analysis
• Representation of results

• The results tabled using statistical
means
• Discussion of results and explanation of
the results through qualitative and
quantitative analysis
You're viewing a preview
Unlock full access by subscribing today!

• IoT security is an Issue
• Current approaches don’t include digital
forensic tools based on IoT
• Proposed solution provides better
investigative capacities for IoT
Paraphrase This Document

• More research to be done on IoT forensic
investigation for smart environment
• Integration of Forensic investigation
capability onto IoT
• Automation of some investigation
processes

FORENSICS
[BY NAME]
[INSTITUIONAL AFFLIATION]
[DATE]
You're viewing a preview
Unlock full access by subscribing today!

• Introduction
• Background
• Methodology
• Conclusion
• Future
Paraphrase This Document

• Criminal activities are on rise using electronic
gadgets
• Cloud forensics deals with that
• Mobile forensics deal with mobo devices
• New mobo device have better processing
abilities
• Current trends analyzed in paper

• Mobile data processing has surpass desktops
• Cloud and Mobile forensic research has
emerged
• BYOD Devices has posed security challenges
for companies
• Company lack control
You're viewing a preview
Unlock full access by subscribing today!

• Review of literature
• Analysis of current trends in Mobo digital
forensics
• Proposed solution analysis
• Representation of results
Paraphrase This Document

• Review of Results of the Proposed model
• Presentation of The results using
statistical models
• Quantitative and Qualitative Models
analysis

• Current solutions not efficient
• Lack of processing capabilities of mobo
devices
• The proposed solution provides
framework for MF digital forensics
• This solves issues with BYOD security
You're viewing a preview
Unlock full access by subscribing today!

• More frameworks to encompasses the
BYOD
• Improving the efficiency of the proposed
solution
Paraphrase This Document

DIGITAL FORENSIC
[BY NAME]
[INSTITUIONAL AFFLIATION]
[DATE]

• Introduction
• Background
• Methodology
• Conclusion
• Future
You're viewing a preview
Unlock full access by subscribing today!

• Paper research on key challenges
• Review of tools used in MF
• Proposed solution given
Paraphrase This Document

• Mobo devices includes smartphones,iPhones,
PDA
• The storage capability have improves
• Processing capabilities improved
• This poses key security threats
• MF has not been evolved in this category

• Review of literature
• Open source tools to showcase proposed
solution
• Result analyzed via statistical methods
• Evidence show proposed solution
provides an edge in MF
You're viewing a preview
Unlock full access by subscribing today!

• Mobo devices have been on rise
• Improvement in Data storage and Processing
capabilities
• Much tools have not been developed for MF
• Proposed solution shows improved MF in mobo
device
Paraphrase This Document

• More tools to be developed
• Improving the open source tools
• Chain of Custody automation in Mobo
devices

NETWORKED SERVICES
[BY NAME]
[INSTITUIONAL AFFLIATION]
[DATE]
You're viewing a preview
Unlock full access by subscribing today!

• Introduction
• Background
• Methodology
• Conclusion
• Future
Paraphrase This Document

• Networked based services have
mushroomed
• Paper Discuss challenges
• Review of background information
• Better framework proposal

• E-commerce and network based services
are rising
• Single protocol tools
• Theoretical frameworks exists for
network based forensics
• Paper introduces multiprotocol approach
You're viewing a preview
Unlock full access by subscribing today!

• Review of Literatures
• Quantitative result analysis
• Qualitative deductions
Paraphrase This Document

• Statistical analysis of the results of the
proposed model
• Qualitative and Quantitative analysis of
results
• Presentation of the results

• Multiple protocol framework suggested
• Large data sets analyzed
• Trust of data guaranteed
• Solves the research problems
You're viewing a preview
Unlock full access by subscribing today!

• Automation of data extraction
• Inclusion of multiple network protocols
Paraphrase This Document

BASED DIGITAL FORENSIC
[BY NAME]
[INSTITUIONAL AFFLIATION]
[DATE]

• Introduction
• Background
• Methodology
• Conclusion
• Future
You're viewing a preview
Unlock full access by subscribing today!

• Technology changed current workspace
• Smart environment emerged
• Security risks are consequences
• Research proposes preemptive digital
forensics for networks
Paraphrase This Document

• Cloud computing revolutionized
computing
• Security still remains a key challenge
• Digital forensic readiness tools
developed
• Tools are majorly reactive rather
proactive

• Review of Existing Works
• Review of Theoretical models
• Analysis of Current system
• Data analysis of proposed system
• Results and Analysis of Results
You're viewing a preview
Unlock full access by subscribing today!

• Proposed solution statically and
qualitative analysis
• Model presentation of the results and
discussion
Paraphrase This Document

• Proposes framework provides proactive
approach
• Useful for network monitoring
• The data is admissible in court rooms
• Proposed solution much efficient

• Automated network scans
• Chain of custody inclusion
You're viewing a preview
Unlock full access by subscribing today!

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
© 2024 | Zucol Services PVT LTD | All rights reserved.