Search Books
The Basics of Hacking and P… Low Tech Hacking: Street Sm…

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

Author Andrew Hoog, Katie Strzempka,
Publisher Syngress
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
58.49 USD
🛒 Buy New on Amazon 🇺🇸
Share:
Book Details
PublisherSyngress
ISBN / ASIN1597496596
ISBN-139781597496599
Sales Rank295,526
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at the methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.

  • Learn techniques to forensically acquire the iPhone, iPad, and other iOS devices
  • An entire chapter focused on data and application security can assist not only forensic investigators, but also application developers and IT security managers
  • Features an in-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system
Amazon Exclusive: Andrew Hoog and Katiey Strzempka, Authors of iPhone and iOS Forensics, Offer Their Top Ten Examples of Data that Can Be Recovered from an iPhone or Android Device

Smartphones are used extensively around the world and serve many purposes. What consumers may not realize, however, is that much of the information stored on these devices can be easily recovered by forensic examiners. The following Top 10 List provides just a few examples of some of the data that can be recovered from an iPhone or Android device:

  1. Social Networking Data
    Sending direct messages on social networking sites might not be the best place to insult your boss or talk behind your friend’s back. In many cases, these messages can be recovered from a smartphone.
  2. Navigation History
    News Flash . . . men ask for directions on their phone. Map searches and driving directions are easily found on these devices.
  3. Web History
    We know what you browsed last summer. Internet browsing history and Google searches are often recovered from iPhone and Android devices.
  4. Text messages
    Deleting a text message does not necessarily mean it is gone forever. Examiners are able to recover deleted messages from certain devices. Think before you text.
  5. Pictures
    A picture is worth a thousand words. Just ask a professional quarterback.
  6. Financial Apps
    Banks aren’t the only ones who know your account numbers and balances. Your smartphone might too. Some bank applications store the individual’s username, account information, and potentially passwords as well.
  7. E-mail
    Find the company leak! E-mail content can be recovered from a smartphone and analyzed to determine whether an employee is sharing confidential data.
  8. GPS Location
    Google and Apple track certain cell tower locations and GPS coordinates, something your mom can’t even do.
  9. Tweets
    Politicians beware: It’s been discovered that direct messages can be recovered from smartphones.
  10. Videos
    Enough said.
How to be an IT Administrator: By Robert McMillen
View
Advanced Networking Concepts Applied Using Linux on IB…
View
Perl Best Practices: Standards and Styles for Developi…
View
Distributed .NET Programming in VB .NET
View
Introduction to Biometrics
View
Mathematical Foundations of Programming Semantics: 5th…
View
Geometric Analysis and Computer Graphics: Proceedings …
View
WordPerfect 6.0 for Windows : Quick Course
View