Copyright

Ch 13: Computer & Mobile Device Forensics

About This Chapter

This self-paced chapter ensures you have the knowledge needed to excel on a test, assignment or project that covers computer and mobile device forensics. Benefit from access to bite-sized lessons, mini quizzes and other study resources that can help you quickly comprehend these forms of forensics.

Computer & Mobile Device Forensics - Chapter Summary

Gain greater insight into computer and mobile device forensics using our fun online lessons. Avoid the time and location restrictions associated with traditional classes and instead study the basics of cyber threats, data breaches, cell phone spyware and more from home or on-the-go. Our instructors present the lessons in an entertaining manner that keeps you engaged, and our quizzes make it easy to gauge your understanding of lesson concepts. If you need additional details about topics presented in this chapter, feel free to submit them to our experts. In no time, you will be ready to:

  • Detail threats, risks and issues related to mobile device security
  • Define and list types of cyber threats
  • Share statistics related to data breaches
  • Explain how to prevent data breaches and protect information
  • Describe how to create and utilize data breach response plans
  • Discuss the analysis and detection of mobile malware
  • Provide details about the detection and removal of cell phone spyware
  • Outline basics steps for detecting spyware on an iPhone

8 Lessons in Chapter 13: Computer & Mobile Device Forensics
Test your knowledge with a 30-question chapter practice test
Mobile Device Security Threats, Risks & Issues

1. Mobile Device Security Threats, Risks & Issues

The widespread use of mobile devices brings new security threats and risks. Learn about the importance of passwords and encryption to secure a mobile device and how to address a variety of risks, including theft and malware.

Cyber Threats: Definition & Types

2. Cyber Threats: Definition & Types

A cyber threat is any unauthorized act of gaining access to a computer network to disrupt processes or obtain data. Understand the definition of cyber threats and discover types of cyber threats, such as trojans, worms, phishing, and unpatched software.

Data Breaches: Definition & Statistics

3. Data Breaches: Definition & Statistics

Data breaches target different types of information and can affect any company. Understand these unauthorized data accesses through a definition and find some examples, as well as information relating to statistics and the law.

Data Breaches: Protection & Prevention

4. Data Breaches: Protection & Prevention

Data breaches occur as large amounts of data are accessed inappropriately, typically highly sensitive or protected information. Identify methods of protecting data, and preventing data breaches to keep information secure.

Data Breach Response Plans

5. Data Breach Response Plans

Data breach response plans are predetermined tactics companies create in response to an unplanned data breach. Walk through an overview of a data breach response plan starting before a breach, moving through it, and post-mortem.

Mobile Malware: Analysis & Detection

6. Mobile Malware: Analysis & Detection

With mobile device often being someone's primary form of computer, it is important to avoid mobile malware. Learn to analyze and detect mobile malware through decreased measurable, slow performance, and sudden hikes in bill costs.

Cell Phone Spyware: Detection & Removal

7. Cell Phone Spyware: Detection & Removal

Cell phone spyware refers to hidden programs that steal personal information. Learn about spyware on your phone and explore the detection and removal of it, including how to use the restore feature.

How to Detect Spyware on an iPhone

8. How to Detect Spyware on an iPhone

Spyware detection is a vital component to securing mobile devices, including iPhones. Understand how spyware works on the iPhone, the conditions that allow spyware, and the symptoms to watch out for.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken
More Exams
There are even more practice exams available in Computer & Mobile Device Forensics.

Earning College Credit

Did you know… We have over 220 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Support