About This Chapter
iOS Data Analysis & Recovery - Chapter Summary
In this chapter, you'll find easy-to-follow lessons on iOS data analysis and recovery. Work at your own pace as you study cache memory, accessing key artifacts in iOS database files and SQLite databases. Even if you've struggled with these concepts before, these easy-to-follow lessons make learning a snap. If you need further assistance after reviewing the lessons, reach out to one of our experts through the Dashboard. Once this chapter has been completed, you should be ready to:
- Outline the types and uses of timestamps in iOS devices
- Identify tools and commands used in SQLite databases
- Discuss the types and location of key artifacts in iOS database files
- Explain the concept of cache memory
- Define property list files for mobile forensics
- Detail the use and controversy around web cookies
- Recover data from damaged media
- Describe the acquisition and analysis techniques associated with iOS forensic tools
1. Timestamps in iOS Devices: Definition, Types & Uses
Timestamps attach to iOS files and represent moments in time. In this lesson, you'll learn more about these time measurements, including its two types: Unix and Mac absolute.
2. Cache Memory: Definition & Concept
Cache memory is a type of memory used to hold frequently used data. Cache memory is relatively small, but very fast. Most web browsers use a cache to load regularly viewed webpages fast. The most important type of cache memory is the CPU cache.
3. What Are Web Cookies? - Use & Controversy
Cookies play a major role in digital marketing. In this lesson, we'll discuss what cookies are, identify their role in digital marketing and go over the controversies surrounding how useful they are in a digital marketing plan.
4. Recovering Data From Damaged Media
When a data storage device gets damaged, recovering data from it becomes the primary concern. In this lesson, we will learn about physical and logical data recovery options for storage media and their limitations.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 335: Mobile Forensics course
- Foundations of Digital Forensics
- Introduction to Mobile Forensics
- Examination of iOS Devices
- Acquiring Data from iOS Devices
- Acquiring Data from iOS Backups
- Android Device Design & Security Overview
- Extracting Data from Android Devices
- Recovering & Analyzing Android Data
- Android App Analysis, Malware & Reverse Engineering
- Windows Phone Forensics