Information Security Technologies: Mobile Forensics Discussion Post

Verified

Added on  2022/09/01

|5
|904
|29
Discussion Board Post
AI Summary
This discussion post delves into the realm of mobile forensics, focusing on the four states a mobile device can be in during data extraction: switch on, switch off, flight mode, and partially working state. The post describes each state, highlighting its impact on investigators and the challenges it presents. For instance, a switched-on state facilitates easier data extraction, while a switched-off state risks data alteration. The post emphasizes the importance of IT professionals in accessing locked devices or handling potentially data-corrupting situations. It also addresses alternatives like SIM card imaging and application-based data backups. The author references academic sources to support the analysis and adheres to APA guidelines. The post provides a comprehensive overview of mobile forensic techniques, crucial for digital investigations.
Document Page
Running head: INFORMATION SECURITY TECHNOLOGIES
INFORMATION SECURITY TECHNOLOGIES
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY TECHNOLOGIES
Discussions
The mobile forensics is a branch of digital forensics that is associated to the discovery
of evidences those are digital from the devices of mobile (Goel & Kumar, 2019). The mobile
forensics is similar to digital forensics and in digital forensics, all the digital media including
mobile devices are present.
A person can store millions of information in mobile phones and the investigators can get
huge amount of information from the mobile phones that will help in the investigation
(Chernyshev et al.,2017). The four states of mobiles phones from which the data can be
extracted include
Phone in switch on state
Phone in switch off state
Phone in flight ,mode
Phone in partially working state.
Switch on state: The investigator can get the mobile devices in the switch on state. This
becomes easier for the investigator to extract the data as the mobile is not off and the data
will not be altered (Jones & Winster, 2017). The phone can be in a locked state and the thing
that the investigator has to do is open the lock form an IT professional and then extract the
data
Switch off state: This state is not very favourable for the investigator as switching on the
device can alter the data present in the devices (Ahmad & Khan, 2017). The investigator must
present the phone to an IT professional in order to open the phone without any modification
in the data present in the mobile devices
Document Page
2INFORMATION SECURITY TECHNOLOGIES
Phone in flight mode: This is a state of the phone when the phone is in flight mode that is no
messages or incoming or outgoing calls can be done. This is a favourable situation for the
investigator, as he has to open the device, switch off the flight mode, and then can extract
information from the device with the help of various tools
Phone in partially working state: the investigator can get hold of some mobile devices those
are partially working. Some of the keys are not working and in case of smart phones the
home button is not working or the lock button is not working (Androulidakis, 2016). The
investigator has to sensibly handle the mobile phone as one bad decision can delete all the
information from the mobile phone. He should present the phone to an IT investigator to take
out the information.
The alternatives in this can be a phone that is dead and when all the information is
deleted from the phone. When the investigator finds a phone that is dead, he should decision
properly. Information can be extracted out from the sim cards of the phone. The forensic
examiner must utilise imaging of the sim card – a process that creates a duplicate image of
the content of sim card (AlShehri, 2018). The original content of the sim card will remain as
it is while the image of the sim card content can be utilised in analytics. All the files of the
images should be hashed to make sure that the data remains unchanged and accurate
Another alternative of the state is that when an investigator finds a phone that is
switched on and in good state but all the information of the phone is deleted. In such a
situation, the investigator must check the applications of the phone (Anwar, Riadi & Luthfi,
2016). There are several applications those are installed in mobile phones that backup the
information of its content. The forensic investigator must check the phone thoroughly in
order to find information. If he finds the informations then he must extract it immediately
without any delay.
Document Page
3INFORMATION SECURITY TECHNOLOGIES
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION SECURITY TECHNOLOGIES
References
Ahmad, M., & Khan, M. N. A. (2017). A Review of Forensic Analysis Techniques for
Android Phones. Journal of Independent Studies and Research-Computing, 15(1), 23-
30.
AlShehri, M. A. R. (2018). A Review of Mobile and SIM Forensics Tools. IJCSNS, 18(3),
150.
Androulidakis, I. (2016). Mobile phone security and forensics. Springer.
Anwar, N., Riadi, I., & Luthfi, A. (2016). Forensic SIM card cloning using authentication
algorithm. International Journal of Electronics and Information Engineering, 4(2),
71-81.
Chernyshev, M., Zeadally, S., Baig, Z., & Woodward, A. (2017). Mobile forensics:
Advances, challenges, and research opportunities. IEEE Security & Privacy, 15(6),
42-51.
Goel, M., & Kumar, V. (2019). Layered Framework for Mobile Forensics
Analysis. Available at SSRN 3351029.
Jones, G. M., & Winster, S. G. (2017). Forensics analysis on smart phones using mobile
forensics tools. International Journal of Computational Intelligence Research, 13(8),
1859-1869.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]