iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices Front Cover

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

  • Length: 336 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2011-06-30
  • ISBN-10: 1597496596
  • ISBN-13: 9781597496599
  • Sales Rank: #1158527 (See Top 100 Books)
Description

As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.

  • Learn techniques to forensically acquire the iPhone, iPad and other iOS devices
  • Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers
  • In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system

As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at the methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.

  • Learn techniques to forensically acquire the iPhone, iPad, and other iOS devices
  • An entire chapter focused on data and application security can assist not only forensic investigators, but also application developers and IT security managers
  • Features an in-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system

Amazon Exclusive: Andrew Hoog and Katiey Strzempka, Authors of iPhone and iOS Forensics, Offer Their Top Ten Examples of Data that Can Be Recovered from an iPhone or Android Device

Smartphones are used extensively around the world and serve many purposes. What consumers may not realize, however, is that much of the information stored on these devices can be easily recovered by forensic examiners. The following Top 10 List provides just a few examples of some of the data that can be recovered from an iPhone or Android device:

  1. Social Networking Data
    Sending direct messages on social networking sites might not be the best place to insult your boss or talk behind your friend’s back. In many cases, these messages can be recovered from a smartphone.
  2. Navigation History
    News Flash . . . men ask for directions on their phone. Map searches and driving directions are easily found on these devices.
  3. Web History
    We know what you browsed last summer. Internet browsing history and Google searches are often recovered from iPhone and Android devices.
  4. Text messages
    Deleting a text message does not necessarily mean it is gone forever. Examiners are able to recover deleted messages from certain devices. Think before you text.
  5. Pictures
    A picture is worth a thousand words. Just ask a professional quarterback.
  6. Financial Apps
    Banks aren’t the only ones who know your account numbers and balances. Your smartphone might too. Some bank applications store the individual’s username, account information, and potentially passwords as well.
  7. E-mail
    Find the company leak! E-mail content can be recovered from a smartphone and analyzed to determine whether an employee is sharing confidential data.
  8. GPS Location
    Google and Apple track certain cell tower locations and GPS coordinates, something your mom can’t even do.
  9. Tweets
    Politicians beware: It’s been discovered that direct messages can be recovered from smartphones.
  10. Videos
    Enough said.

To access the link, solve the captcha.