Copyright

Ch 4: Acquiring Data from iOS Devices

About This Chapter

Check out this chapter on acquiring data from iOS devices if you need a resource you can use to prepare for an exam or get help with a tough homework assignment. This chapter is made up of short lessons and self-assessment quizzes you can access 24/7.

Acquiring Data from iOS Devices - Chapter Summary

If you need to study how data is acquired from iOS devices, this chapter is for you. We've put together short lessons on iOS device operating modes, the transmission of digital data, systems software and setting up a mobile forensics environment for iOS devices. Each lesson is accompanied by a short quiz that allows you to quickly assess your knowledge. If you have questions, submit them to one of our experts through the Dashboard. Once this chapter is completed, you should be ready to:

  • Outline the process of logical acquisition
  • Detail the forensic use of password crackers for investigating digital crime
  • Perform filesystem acquisition using the RAM disk in iOS devices
  • Explain the impact of volatile and non-volatile memory on physical acquisition
  • Provide the basics of the Windows OS for digital forensics
  • Define read-only memory (ROM)
  • Add and authenticate users in Linux
  • Identify the basics of the Mac OS for digital forensics

7 Lessons in Chapter 4: Acquiring Data from iOS Devices
Test your knowledge with a 30-question chapter practice test
Digital Data: Acquisition & Transmission

1. Digital Data: Acquisition & Transmission

Everyday we hear more and more about the importance of data, but how do we end up with all that information anyway? This lesson shows, at a very fundamental level, how digital data is created and transmitted.

Systems Software: Utility Software, Device Drivers and Firmware

2. Systems Software: Utility Software, Device Drivers and Firmware

System software coordinates the activities and functions of hardware and software, and it controls the operations of computer hardware. Learn about different types of system software, including utility software, device drivers and firmware.

Forensic Use of Password Crackers for Investigating Digital Crime

3. Forensic Use of Password Crackers for Investigating Digital Crime

This lesson will explain the different techniques that threat actors use to steal passwords. We'll also provide one example of a software program that is commonly used when cracking passwords.

Basics of the Windows OS for Digital Forensics

4. Basics of the Windows OS for Digital Forensics

This lesson provides a history of the Windows operating system and the files that are used for its operation. In addition, this lesson will describe some basic forensic tools that can help access and review volatile data.

Read-Only Memory (ROM): Definition & Types

5. Read-Only Memory (ROM): Definition & Types

Computers have various types of memory. Read-only memory (ROM) contains the instructions for what needs to happen when a computer is powered on. The data in ROM cannot be modified, or only with great difficulty, since these instructions do not need to be changed very often.

Authenticating & Adding Users in Linux

6. Authenticating & Adding Users in Linux

In this lesson we will be exploring what happens when a user logs into Linux. We'll then discuss the methods of creating users and setting their passwords. We'll outline a few examples, as well as give a quick overview of the pwconv and pwunconv commands. That will lead us to working with Linux's unique identifiers as well as some important configuration files we'll need to understand.

Basics of the Macintosh OS for Digital Forensics

7. Basics of the Macintosh OS for Digital Forensics

Digital Forensics typically involves gathering digital evidence from a computer. This lesson covers the basics of digital forensics on the Macintosh operating system. We will discuss the types of logs, where they are stored, and how to get information from them, and also discuss some other techniques of digital forensics.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support