About This Chapter
Examination of iOS Devices - Chapter Summary
View concise lessons on iOS device examination that you can study at your leisure. Just a few of the topics covered include different types of file systems, the history of iOS development and the layers of iOS security architecture. Work at your own pace and feel free to go back as often as needed to review any of the lessons again. Our experts are available through the Dashboard to answer any questions you might have. After you finish this chapter, you should be ready to:
- Outline the different types of mobile iOS devices and data
- Differentiate between different file systems
- Define the HFS+ filesystem, its characteristics and internal structure
- Use external searching and b-trees in memory management
- Identify the features and structure of the APFS filesystem
- Provide a history of iOS development
- Detail the layers and components of iOS architecture components
- Give examples of threads in an operating system
- Point out the layers and features of iOS security architecture
- Prevent privilege escalation
- Discuss best practices for mobile security management
1. Mobile iOS Devices & Data: Types, Storage & Access Methods
Mobile iOS devices are increasingly common and are likely to be encountered by forensic experts. In this lesson, you'll learn more about these devices, the data they store (and where) and how the data is accessed.
2. File Systems: FAT, NTFS, and HFS+
Computers use file systems to control how information is stored and retrieved. Each file system has its own structure and logic. Learn about the different types of file systems for different operating systems in this lesson.
3. Using External Searching & B-Trees in Memory Management
In this lesson, we will learn about the nature and management of B-Trees. We will examine their characteristics, advantages, and how a basic search operation is carried out using their nodal structure.
4. iOS Architecture Components: Layers & Components
The iOS architecture consists of four layers that, combined, help applications communicate with device hardware. In this lesson, you'll learn more about each of the four layers that lives in the iOS environment.
5. Threads in an Operating System: Definition & Examples
In this lesson, you will learn about threads in an operating system and how they work with processes. We will discuss the differences between threads and processes and also understand the concept of multi-threading.
6. Preventing Privilege Escalation
In this lesson we will learn the definition of privilege escalation, the activities that comprise the attack and the different methods system administrator can employ to secure prevention.
7. Mobile Device Security Management: Software & Best Practices
While IT security professionals may prefer that their employees' devices never leave the office, that simply is not practical. In this lesson we look at the importance of mobile device security management.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 335: Mobile Forensics course
- Foundations of Digital Forensics
- Introduction to Mobile Forensics
- Acquiring Data from iOS Devices
- Acquiring Data from iOS Backups
- iOS Data Analysis & Recovery
- Android Device Design & Security Overview
- Extracting Data from Android Devices
- Recovering & Analyzing Android Data
- Android App Analysis, Malware & Reverse Engineering
- Windows Phone Forensics