ERM Week 6 Research Paper

docx

School

University of the Cumberlands *

*We aren’t endorsed by this school

Course

ITS 835

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

10

Uploaded by patilsushant26

Report
Understanding Mobile Forensics and its complexities in the context of modern-day digital era Sushant Anil Patil Department of Information Technology ITS-835 A02 Enterprise Risk Management Dr. Jimmie Flores October 8 th , 2023
Understanding Mobile Forensics and its complexities in the context of the modern- day digital era Abstract The field of mobile forensics is becoming increasingly important as the use of mobile devices continues to grow. This article explores the basics of mobile forensics, including its differences from computer forensics, the challenges involved, the tools available, and the unique approaches needed for iOS versus Android devices. Introduction The ubiquitous presence of mobile devices in modern society has rendered them indispensable tools for various purposes beyond mere communication. They have become the primary means for capturing precious memories, managing schedules, facilitating payments, and controlling smart homes. Nevertheless, these devices store vast personal data, ranging from locations to messages, making them critical sources of potential digital evidence. In response, mobile forensics has emerged as a vital area of study dedicated to extracting digital evidence from these devices. Mobile forensics enables analysts to trace a person's last known GPS location, validate alibis with timestamped data, or identify anomalies that may implicate cyber fraud. Concealed within our phones, such information often becomes essential evidence in civil and criminal contexts.
It is crucial to appreciate the differences between mobile forensics and computer forensics. While both fields aim to retrieve digital evidence, they present distinct challenges. Computers provide a relatively stable data extraction environment, while mobile devices introduce a kaleidoscope of brands, operating systems, models, and software versions. Each instrument necessitates a unique approach to forensic analysis, making the task considerably more intricate. Understanding mobile device vulnerabilities is essential for security professionals, and the general public would also benefit significantly from knowledge about how their data can be accessed or misused. It is critical to comprehend potential threats and protective measures in an era of rampant privacy breaches. As mobile devices play a significant role in our lives, understanding mobile forensics becomes increasingly vital. It is about ensuring personal security, facilitating justice, and fostering a responsible digital community. Security professionals and academics must develop a deeper understanding of mobile forensics ( Bommisetty et al., 2014) . Mobile Forensics Mobile forensics is a subfield of digital forensics that entails extracting and scrutinizing data from mobile devices such as smartphones, tablets, and wearables. These devices contain a wealth of personal and professional information, rendering them invaluable in investigative procedures. The mobile forensics process follows the principle of "forensically sound conditions" to ensure the authenticity and integrity of the evidence. This demands strict adherence to established guidelines to prevent any tampering or modification of the evidence. Mobile devices store various data types, including call logs, messages, photos, videos, and
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
information from multiple apps. Social media apps can offer insights into relationships and interactions, navigation apps can reveal movements, and financial apps can reveal transactions. Furthermore, cloud syncing can maintain data that has been deleted from the device. However, given the rapid advancement of mobile technology, forensic professionals must remain up to date with frequent software updates, new security measures, and an expanding range of apps. Mobile forensics necessitates data retrieval and a profound comprehension of mobile ecosystems, fastidious preservation of evidence, and data interpretation for diverse applications, including legal proceedings and security assessments ( Alatawi et al., 2020) . Comparison of Mobile and Computer Forensics Mobile and computer forensics fields share a common goal of extracting and examining digital evidence, but they differ significantly in their approaches and obstacles. One main difference is the wide range of devices in the mobile market. Unlike computers with more standardized architectures, mobile devices come in different brands, models, and specifications. This requires forensic techniques that are tailored to each specific mobile device. Another significant distinction is the operating systems they use. While computers mainly use Windows, MacOS, or Linux, mobile devices are dominated by iOS or Android, each with unique architecture and security features. This affects the selection and effectiveness of forensic tools. Moreover, mobile devices are designed for continuous connectivity, resulting in frequent data changes from updates and cloud syncing. As a result, forensic experts need to use specialized techniques to preserve and retrieve evidence due to the volatile nature of data on mobile devices.
In summary, while the goals of mobile and computer forensics are similar, the paths to achieving them differ significantly due to the inherent challenges of each field. Network Attacks arising from Mobile Devices The widespread use of mobile devices in our daily lives has made us more vulnerable to cyber threats originating from these devices. Although the exact proportion of network attacks from mobile devices varies, a significant amount has been attributed to them. For example, Cisco's 2020 annual cybersecurity report revealed that mobile malware is not a minor threat but a substantial contributor to the cyberattack landscape. According to the report, mobile devices were involved in nearly 10% of all cyberattacks. With the increasing use of mobile devices for personal and professional purposes and the expansion of apps and platforms, it's reasonable to assume that this percentage has grown even more since then. As mobile platforms become more integrated into various industries, it's crucial to understand and mitigate their associated cyber risks. Challenges and Limitations for Mobile Forensics Mobile forensics faces a unique set of challenges emanating from the ever-evolving landscape of mobile technology. The primary challenge is the diverse range of mobile devices available in the market, with several manufacturers releasing numerous models annually, each with its custom operating system. This renders the forensic process complex, as each device may require a slightly different approach or tool, necessitating forensic professionals to be adaptable in their methods (Krishnan et al, 2019).
Encryption is another challenge that stands out. Recently, mobile devices have implemented robust encryption methods by default as privacy concerns become more significant. While this is crucial for user security, it can also be a substantial barrier in forensic investigations, making it difficult to access vital data. Moreover, remote wipe capabilities further exacerbate these challenges. These features are designed as a security measure, allowing users to erase their data remotely if their device is lost or stolen. However, crucial evidence may be permanently lost if this feature is activated before forensic analysis. Finally, integrating cloud storage in mobile ecosystems adds another complexity to forensic investigations. As devices regularly back up data to cloud services, forensic analysts must focus on the physical machine and consider the data stored remotely. This may include vital evidence or backups of deleted local data. Mobile Forensics Tools Regarding mobile forensics, specialized tools are necessary to tackle the challenges of mobile devices. According to Yodha (2023), several solutions have emerged to meet these needs: Cellebrite UFED is a widely recognized tool known for extracting data from diverse devices, covering many of the market's nuances. MSAB XRY offers a comprehensive suite for mobile forensics, equipped to handle data extraction and detailed analysis to facilitate thorough investigations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Oxygen Forensic Detective has established itself as a leader in data extraction from mobile devices and its capability to pull data from cloud services and even drones, reflecting the ever-evolving nature of digital forensics. Lastly, Magnet AXIOM provides a holistic solution, adept at acquiring and analyzing data from mobile devices and traditional computers, bridging the gap between the forensic realms. Mobile Forensics in the context of iOS and Android operating systems In the realm of mobile forensics, it is apparent that significant discrepancies exist between the iOS and Android platforms. These differences arise from the prevalence of each system and its unique architectural designs, philosophies, and challenges ( Abalenkovs at al., 2012) . One area in which the two platforms differ is their respective file systems . iOS devices utilize a hierarchical file system structure, which ensures a well-organized sequence and classification of stored data. Conversely, Android employs a more intricate split file system, which organizes user and system data in a unique manner that can lead to varying points of data retrieval for forensic investigations ( Lwin et al., 2020) . Another area of contrast is in their security protocols . iOS devices, under Apple's proprietary umbrella, operate within a tightly controlled ecosystem encompassing hardware and software elements. While this approach enhances user security and privacy, it can pose a significant challenge to forensic experts. Conversely, Android champions an open-source
philosophy that grants investigators challenges and opportunities due to its flexibility ( Lwin et al., 2020) . Direct Data Access is another contrasting area. iOS is infamous for its stringent restrictions on permitting direct access to its file system, making it necessary for forensic professionals to find alternative ways to access crucial data. On the other hand, Android, a more open approach, occasionally provides more leeway. Rooted Android devices, in particular, can grant elevated permissions, enabling analysts to bypass certain restrictions and delve deeper into the device's data repositories ( Lwin et al., 2020) . Conclusion The proliferation of mobile technology in our daily lives has engendered an increased demand for mobile forensics. Forensic professionals must grapple with the unique challenges and opportunities in mobile forensics, particularly as the distinction between it and computer forensics becomes more pronounced. Each mobile device is characterized by its distinct operating system, such as iOS and Android, rendering a one-size-fits-all strategy unsuitable for forensic investigations. Additional complications arise from encryption, remote wipe capabilities, and cloud storage considerations. Mobile devices are highly susceptible to network attacks, heightening the importance of understanding the forensic landscape. Various tools, such as Cellebrite UFED and Magnet AXIOM, have been developed to provide tailored solutions for navigating the complex mobile digital terrain. Nonetheless, the forensic landscape remains diverse and ever-changing, as evidenced by the contrasting approaches for iOS and Android analysis. In conclusion, mobile forensics remains essential to ensuring digital security, legal accountability, and safeguarding personal
rights as mobile devices evolve and increase. This dynamic field demands adaptability, continuous learning, and a deep understanding of the technological landscape.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References 1. Alatawi, H., Alenazi, K., Alshehri, S., Alshamakhi, S., Mustafa, M., & Aljaedi, A. (2020, September). Mobile forensics: A review. In   2020 International Conference on Computing and Information Technology (ICCIT-1441)   (pp. 1-6). IEEE. 2. Lwin, H. H., Aung, W. P., & Lin, K. K. (2020, February). Comparative analysis of Android mobile forensics tools. In   2020 IEEE Conference on Computer Applications (ICCA)   (pp. 1-6). IEEE. 3. Abalenkovs, D., Bondarenko, P., Pathapati, V. K., Nordbø, A., Piatkivskyi, D., Rekdal, J. E., & Ruthven, P. B. (2012). Mobile forensics: Comparison of extraction and analyzing methods of ios and android.   Gjovik University College, Gjovik, Norway , 1-13. 4. Yodha, C. (2023, January 25). Top 10 best Mobile Forensics Tool. Cyber Yodha . https://www.cyberyodha.org/2023/01/top-10-best-mobile-forensics-tool.html 5. Krishnan, S., Zhou, B., & An, M. K. (2019). Smartphone forensic challenges. 6. Bommisetty, S., Tamma, R., & Mahalik, H. (2014).   Practical mobile forensics . Packt Publishing Ltd.