ERM Week 6 Research Paper
docx
keyboard_arrow_up
School
University of the Cumberlands *
*We aren’t endorsed by this school
Course
ITS 835
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
10
Uploaded by patilsushant26
Understanding Mobile Forensics and its complexities in the context of modern-day digital era
Sushant Anil Patil
Department of Information Technology
ITS-835 A02 Enterprise Risk Management
Dr. Jimmie Flores
October 8
th
, 2023
Understanding Mobile Forensics and its complexities in the context of the modern-
day digital era
Abstract
The field of mobile forensics is becoming increasingly important as the use of mobile
devices continues to grow. This article explores the basics of mobile forensics, including its
differences from computer forensics, the challenges involved, the tools available, and the unique
approaches needed for iOS versus Android devices.
Introduction
The ubiquitous presence of mobile devices in modern society has rendered them
indispensable tools for various purposes beyond mere communication. They have become the
primary means for capturing precious memories, managing schedules, facilitating payments, and
controlling smart homes. Nevertheless, these devices store vast personal data, ranging from
locations to messages, making them critical sources of potential digital evidence. In response,
mobile forensics has emerged as a vital area of study dedicated to extracting digital evidence
from these devices. Mobile forensics enables analysts to trace a person's last known GPS
location, validate alibis with timestamped data, or identify anomalies that may implicate cyber
fraud. Concealed within our phones, such information often becomes essential evidence in civil
and criminal contexts.
It is crucial to appreciate the differences between mobile forensics and computer
forensics. While both fields aim to retrieve digital evidence, they present distinct challenges.
Computers provide a relatively stable data extraction environment, while mobile devices
introduce a kaleidoscope of brands, operating systems, models, and software versions. Each
instrument necessitates a unique approach to forensic analysis, making the task considerably
more intricate. Understanding mobile device vulnerabilities is essential for security
professionals, and the general public would also benefit significantly from knowledge about how
their data can be accessed or misused. It is critical to comprehend potential threats and protective
measures in an era of rampant privacy breaches.
As mobile devices play a significant role in our lives, understanding mobile forensics
becomes increasingly vital. It is about ensuring personal security, facilitating justice, and
fostering a responsible digital community. Security professionals and academics must develop a
deeper understanding of mobile forensics (
Bommisetty et al., 2014)
.
Mobile Forensics
Mobile forensics is a subfield of digital forensics that entails extracting and scrutinizing
data from mobile devices such as smartphones, tablets, and wearables. These devices contain a
wealth of personal and professional information, rendering them invaluable in investigative
procedures. The mobile forensics process follows the principle of "forensically sound
conditions" to ensure the authenticity and integrity of the evidence. This demands strict
adherence to established guidelines to prevent any tampering or modification of the evidence.
Mobile devices store various data types, including call logs, messages, photos, videos, and
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
information from multiple apps. Social media apps can offer insights into relationships and
interactions, navigation apps can reveal movements, and financial apps can reveal transactions.
Furthermore, cloud syncing can maintain data that has been deleted from the device.
However, given the rapid advancement of mobile technology, forensic professionals must remain
up to date with frequent software updates, new security measures, and an expanding range of
apps. Mobile forensics necessitates data retrieval and a profound comprehension of mobile
ecosystems, fastidious preservation of evidence, and data interpretation for diverse applications,
including legal proceedings and security assessments (
Alatawi et al., 2020) .
Comparison of Mobile and Computer Forensics
Mobile and computer forensics fields share a common goal of extracting and examining
digital evidence, but they differ significantly in their approaches and obstacles. One main
difference is the wide range of devices in the mobile market. Unlike computers with more
standardized architectures, mobile devices come in different brands, models, and specifications.
This requires forensic techniques that are tailored to each specific mobile device. Another
significant distinction is the operating systems they use. While computers mainly use Windows,
MacOS, or Linux, mobile devices are dominated by iOS or Android, each with unique
architecture and security features. This affects the selection and effectiveness of forensic tools.
Moreover, mobile devices are designed for continuous connectivity, resulting in frequent data
changes from updates and cloud syncing. As a result, forensic experts need to use specialized
techniques to preserve and retrieve evidence due to the volatile nature of data on mobile devices.
In summary, while the goals of mobile and computer forensics are similar, the paths to achieving
them differ significantly due to the inherent challenges of each field.
Network Attacks arising from Mobile Devices
The widespread use of mobile devices in our daily lives has made us more vulnerable to
cyber threats originating from these devices. Although the exact proportion of network attacks
from mobile devices varies, a significant amount has been attributed to them. For example,
Cisco's 2020 annual cybersecurity report revealed that mobile malware is not a minor threat but a
substantial contributor to the cyberattack landscape. According to the report, mobile devices
were involved in nearly 10% of all cyberattacks. With the increasing use of mobile devices for
personal and professional purposes and the expansion of apps and platforms, it's reasonable to
assume that this percentage has grown even more since then. As mobile platforms become more
integrated into various industries, it's crucial to understand and mitigate their associated cyber
risks.
Challenges and Limitations for Mobile Forensics
Mobile forensics faces a unique set of challenges emanating from the ever-evolving
landscape of mobile technology. The primary challenge is the diverse range of mobile devices
available in the market, with several manufacturers releasing numerous models annually, each
with its custom operating system. This renders the forensic process complex, as each device may
require a slightly different approach or tool, necessitating forensic professionals to be adaptable
in their methods (Krishnan et al, 2019).
Encryption
is another challenge that stands out. Recently, mobile devices have
implemented robust encryption methods by default as privacy concerns become more significant.
While this is crucial for user security, it can also be a substantial barrier in forensic
investigations, making it difficult to access vital data.
Moreover, remote wipe
capabilities further exacerbate these challenges. These features
are designed as a security measure, allowing users to erase their data remotely if their device is
lost or stolen. However, crucial evidence may be permanently lost if this feature is activated
before forensic analysis.
Finally, integrating
cloud storage
in mobile ecosystems adds another complexity to
forensic investigations. As devices regularly back up data to cloud services, forensic analysts
must focus on the physical machine and consider the data stored remotely. This may include vital
evidence or backups of deleted local data.
Mobile Forensics Tools
Regarding mobile forensics, specialized tools are necessary to tackle the challenges of
mobile devices. According to Yodha (2023), several solutions have emerged to meet these needs:
Cellebrite UFED
is a widely recognized tool known for extracting data from diverse
devices, covering many of the market's nuances.
MSAB XRY
offers a comprehensive suite for mobile forensics, equipped to handle data
extraction and detailed analysis to facilitate thorough investigations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Oxygen Forensic Detective
has established itself as a leader in data extraction from
mobile devices and its capability to pull data from cloud services and even drones, reflecting the
ever-evolving nature of digital forensics.
Lastly, Magnet AXIOM
provides a holistic solution, adept at acquiring and analyzing
data from mobile devices and traditional computers, bridging the gap between the forensic
realms.
Mobile Forensics in the context of iOS and Android operating systems
In the realm of mobile forensics, it is apparent that significant discrepancies exist
between the iOS and Android platforms. These differences arise from the prevalence of each
system and its unique architectural designs, philosophies, and challenges (
Abalenkovs at al.,
2012)
.
One area in which the two platforms differ is their respective file systems
. iOS devices
utilize a hierarchical file system structure, which ensures a well-organized sequence and
classification of stored data. Conversely, Android employs a more intricate split file system,
which organizes user and system data in a unique manner that can lead to varying points of data
retrieval for forensic investigations (
Lwin et al., 2020)
.
Another area of contrast is in their security protocols
. iOS devices, under Apple's
proprietary umbrella, operate within a tightly controlled ecosystem encompassing hardware and
software elements. While this approach enhances user security and privacy, it can pose a
significant challenge to forensic experts. Conversely, Android champions an open-source
philosophy that grants investigators challenges and opportunities due to its flexibility (
Lwin et
al., 2020)
.
Direct Data Access
is another contrasting area. iOS is infamous for its stringent
restrictions on permitting direct access to its file system, making it necessary for forensic
professionals to find alternative ways to access crucial data. On the other hand, Android, a more
open approach, occasionally provides more leeway. Rooted Android devices, in particular, can
grant elevated permissions, enabling analysts to bypass certain restrictions and delve deeper into
the device's data repositories (
Lwin et al., 2020)
.
Conclusion
The proliferation of mobile technology in our daily lives has engendered an increased
demand for mobile forensics. Forensic professionals must grapple with the unique challenges
and opportunities in mobile forensics, particularly as the distinction between it and computer
forensics becomes more pronounced. Each mobile device is characterized by its distinct
operating system, such as iOS and Android, rendering a one-size-fits-all strategy unsuitable for
forensic investigations. Additional complications arise from encryption, remote wipe capabilities,
and cloud storage considerations. Mobile devices are highly susceptible to network attacks,
heightening the importance of understanding the forensic landscape. Various tools, such as
Cellebrite UFED and Magnet AXIOM, have been developed to provide tailored solutions for
navigating the complex mobile digital terrain.
Nonetheless, the forensic landscape remains diverse and ever-changing, as evidenced by
the contrasting approaches for iOS and Android analysis. In conclusion, mobile forensics
remains essential to ensuring digital security, legal accountability, and safeguarding personal
rights as mobile devices evolve and increase. This dynamic field demands adaptability,
continuous learning, and a deep understanding of the technological landscape.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References
1.
Alatawi, H., Alenazi, K., Alshehri, S., Alshamakhi, S., Mustafa, M., & Aljaedi, A. (2020, September). Mobile forensics: A review. In
2020 International Conference on Computing and Information Technology (ICCIT-1441)
(pp. 1-6). IEEE.
2.
Lwin, H. H., Aung, W. P., & Lin, K. K. (2020, February). Comparative analysis of Android mobile forensics tools. In
2020 IEEE Conference on Computer Applications (ICCA)
(pp. 1-6). IEEE.
3.
Abalenkovs, D., Bondarenko, P., Pathapati, V. K., Nordbø, A., Piatkivskyi, D., Rekdal, J. E., & Ruthven, P. B. (2012). Mobile forensics: Comparison of extraction and analyzing methods of ios and android.
Gjovik University College, Gjovik, Norway
, 1-13.
4.
Yodha, C. (2023, January 25). Top 10 best Mobile Forensics Tool. Cyber Yodha
. https://www.cyberyodha.org/2023/01/top-10-best-mobile-forensics-tool.html
5.
Krishnan, S., Zhou, B., & An, M. K. (2019). Smartphone forensic challenges.
6.
Bommisetty, S., Tamma, R., & Mahalik, H. (2014).
Practical mobile forensics
. Packt Publishing Ltd.