About This Chapter
Acquiring Data from iOS Devices - Chapter Summary
If you need to study how data is acquired from iOS devices, this chapter is for you. We've put together short lessons on iOS device operating modes, the transmission of digital data, systems software and setting up a mobile forensics environment for iOS devices. Each lesson is accompanied by a short quiz that allows you to quickly assess your knowledge. If you have questions, submit them to one of our experts through the Dashboard. Once this chapter is completed, you should be ready to:
- Outline the process of logical acquisition
- Detail the forensic use of password crackers for investigating digital crime
- Perform filesystem acquisition using the RAM disk in iOS devices
- Explain the impact of volatile and non-volatile memory on physical acquisition
- Provide the basics of the Windows OS for digital forensics
- Define read-only memory (ROM)
- Add and authenticate users in Linux
- Identify the basics of the Mac OS for digital forensics
1. Digital Data: Acquisition & Transmission
Everyday we hear more and more about the importance of data, but how do we end up with all that information anyway? This lesson shows, at a very fundamental level, how digital data is created and transmitted.
2. Systems Software: Utility Software, Device Drivers and Firmware
System software coordinates the activities and functions of hardware and software, and it controls the operations of computer hardware. Learn about different types of system software, including utility software, device drivers and firmware.
3. Forensic Use of Password Crackers for Investigating Digital Crime
This lesson will explain the different techniques that threat actors use to steal passwords. We'll also provide one example of a software program that is commonly used when cracking passwords.
4. Basics of the Windows OS for Digital Forensics
This lesson provides a history of the Windows operating system and the files that are used for its operation. In addition, this lesson will describe some basic forensic tools that can help access and review volatile data.
5. Read-Only Memory (ROM): Definition & Types
Computers have various types of memory. Read-only memory (ROM) contains the instructions for what needs to happen when a computer is powered on. The data in ROM cannot be modified, or only with great difficulty, since these instructions do not need to be changed very often.
6. Authenticating & Adding Users in Linux
In this lesson we will be exploring what happens when a user logs into Linux. We'll then discuss the methods of creating users and setting their passwords. We'll outline a few examples, as well as give a quick overview of the pwconv and pwunconv commands. That will lead us to working with Linux's unique identifiers as well as some important configuration files we'll need to understand.
7. Basics of the Macintosh OS for Digital Forensics
Digital Forensics typically involves gathering digital evidence from a computer. This lesson covers the basics of digital forensics on the Macintosh operating system. We will discuss the types of logs, where they are stored, and how to get information from them, and also discuss some other techniques of digital forensics.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 335: Mobile Forensics course
- Foundations of Digital Forensics
- Introduction to Mobile Forensics
- Examination of iOS Devices
- Acquiring Data from iOS Backups
- iOS Data Analysis & Recovery
- Android Device Design & Security Overview
- Extracting Data from Android Devices
- Recovering & Analyzing Android Data
- Android App Analysis, Malware & Reverse Engineering
- Windows Phone Forensics