About This Chapter
Introduction to Mobile Forensics - Chapter Summary
Study topics related to mobile forensics using this mobile-friendly chapter as your guide. Here, you'll review the uses of mobile forensics, the mobile ecosystem and security mechanisms used in it. Review as few or as many of these lessons as needed to reach your goals. If you have questions as you study, submit them through the Dashboard for one of our experts to answer. After you complete this chapter, you should be ready to:
- Define mobile forensics and its principles
- Explain how mobile and desktop devices impact forensic investigations
- Outline challenges in mobile forensics investigations
- Discuss the process used in mobile forensics incidents
- Detail the features of a mobile operating system
- Point out the risks in a mobile ecosystem
- Identify common case data types in mobile forensics investigations
- Analyze and collect evidence in mobile forensics
- Outline the levels in the mobile device forensics tool classification system
- Differentiate between the logical, manual and physical data acquisition methods in mobile forensics
1. Mobile Forensics: Definition, Uses & Principles
Mobile forensics is increasingly important in today's connected world. In this lesson, you'll learn more about mobile forensics, its uses, and the importance and steps of a forensically sound mobile investigation.
2. Challenges in Mobile Forensics Investigations
Mobile forensics experts face unique challenges in the mobile forensics investigation process. In this lesson, you'll learn about some of the most common situations that present themselves when dealing with these devices.
3. What is a Mobile Operating System? - Features & Types
Are you Team iOS or Team Android? In this lesson, we'll explain the basic of mobile operating systems, break down the most popular types and take a look at a few of their most important features.
4. Common Case Data Types in Mobile Forensics Investigations
Mobile phones are full of data types that may be gathered in a mobile forensics investigation. In this lesson, you'll learn more about some of these various data types and where they're found.
5. Collecting & Analyzing Evidence in Mobile Forensics
Collecting and analyzing data in mobile forensics requires some best practices related to seizure, acquisition and examination of that data. In this lesson, you'll learn more about some of these best practices.
6. Mobile Device Forensics Tool Classification System: Definition & Levels
The mobile device forensics tool classification system details the tools investigators may use to gather mobile data. In this lesson, you'll learn about each and some of the pros and cons behind each method.
7. Data Acquisition Methods in Mobile Forensics: Physical, Logical & Manual
Mobile forensics data acquisition takes three forms: manual, logical and physical. In this lesson, we'll identify each of these and describe what each method entails for investigators working with mobile devices.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 335: Mobile Forensics course
- Foundations of Digital Forensics
- Examination of iOS Devices
- Acquiring Data from iOS Devices
- Acquiring Data from iOS Backups
- iOS Data Analysis & Recovery
- Android Device Design & Security Overview
- Extracting Data from Android Devices
- Recovering & Analyzing Android Data
- Android App Analysis, Malware & Reverse Engineering
- Windows Phone Forensics