Smartphone Forensics Analysis: A Case Study
|
|
|
- Darren Fowler
- 10 years ago
- Views:
Transcription
1 Smartphone Forensics Analysis: A Case Study Mubarak Al-Hadadi and Ali AlShidhani Abstract Smartphone forensics is a sub-set of digital forensics, and refers to the investigation and acquisition of artefacts in mobile phones. New threats to mobile phones made forensic science a challenging endeavour in the last couple of years. Number of mobile users is increasing worldwide and createstremendous problems and challenges. The literature relevant to Smartphone forensics, as explored in this paper, focuses on the architecture of Smartphone operating systems and anti-forensics techniques. It also addresses the digital evidence of Smartphone applications. In this paper, through a consideration of types of crimes involving Smartphone s, a real case study from the Sultanate of Oman is presented. This case study undertakes practical experiments to identified sources for evidence that can later be used in the judiciary system. Index Terms Smartphone forensics, digital forensics, security, Anti-forensic and smartphone security I. INTRODUCTION Mobile forensics is a new type of gathering digital evidence where the information is retrieved from a mobile phone. It relies on evidence extraction from the internal memory of a mobile phone when there is the capability to access data. Mobile phone technologies witnessed rapid development in recent years. Different software tools are available to retrieve and analyze smartphone data. Each tool has its set of advantages and limitations. These tools are essential for smartphone forensics to extract digital evidence that can be later used in a legal case [1]. A. The Evolution of Smartphones Smartphones embodies the continuing evolution of the mobile communications technology. They are not only used for the purpose of messaging and calling, they have many other applications. Smartphones are now used for browsing the Internet and navigating through maps, as well as, for photography, videography and many other use cases. There is an evolution in network connectivity that goes hand-inhand with the evolution of smartphones. Wireless communications such as Wireless Local Area Networks (WLANs) have developed to become faster and more stable. Cellular communications such as the 3rd Generation (3G) and 4th Generation (4G) Mobile Systems are widely available and offers data speeds in tens of Mbps [2]. B. Architecture of Smartphone Operating Systems Handful number of smartphone operating systems exists in the market today. Google s Android and Apple s ios Manuscript received March 5, 2013; revised June 16, 2013 The authors are with the Department of Electrical and Computer Engineering, Sultan Qaboos University, Sultanate of Oman ( [email protected]; [email protected]). unmistakably are dominating. Smartphone operating systems create major challenges for investigators in the extraction of data because of their complexity [3]. ios operating system contains four layers on which applications run. Layer one of the operating system provides direct access to memory and OS kernel. The second layer contains basic services written in C programming language. Layer three handles graphics, images, video and audio. Layer four, the last layer,provides an interface between users and applications [4]. Android architecture [5] on the other hand consists of five layers, applications layer, the application framework, libraries, Android runtime and the Linux kernel. The applications layer is written in Java. Applications are usually developed by third party companies and later ported to the device. On the other hand, each set of application programming interfaces available (APIs) that contains some of the capabilities are interesting, such as those that provide the interface with the file system. C. Smartphone Forensics Smartphones have become essential to our daily lives. Smartphones are now used as a mobile office or entertainment centre, incorporating basic needs for communicating with friends and relatives. Their storage capacity and processing capabilities are to be equated to low end computers. Smartphones became susceptible to the same and greater vulnerabilities as computers. The data in smartphones such as images, documents, s, videos and short messages (SMS) can be remotely accessed if the device is connected to the Internet. This reality poses a major challenge for forensics investigators. There are many applications that can run on a smartphone and more are developed every day. Considering the variety of smartphone vendors, mobile applications and networking protocols, the task of forensic analysis on mobile phones is ever challenging. When dealing with mobile devices such as smartphones, there are three areas where data is stored: the SIM card, which primarily contains contact information and texts; the device memory, which stores user created data such as MMS, text messages, photographs, media...etc, and also contains the phones operating system and settings; and, the device memory which also stores portable application software such as WhatsApp and the appropriate logs. There are also portable storage memory devices such as Micro SD cards which again store large amounts of data. Smartphones that have portable applications such as WhatsApp store data within the application itself on the specific device. D. Smartphones Anti-Forensics Challenges Anti-forensics, generally, is the use of technology to DOI: /IJCEE.2013.V
2 defeat forensic investigation. In recent years, anti-forensics for mobiles faces major challenges. Attackers could deliberately mask or hide digital evidence in the smartphone. Anti-forensics practices are currently evolving and spreading, and are not limited to traditional applications. For instance, mobile devices used in the field of forensics medicinestore a significant amount of personal information. The information could be very sensitive and leaking them poses a high risk [6]. Smartphone forensic investigators must understandthe interworking of smartphone operating system layers because layers depend on each other.applications written by third party developers can access specific OS layers and as a result tamper with the file system and erase digital evidence. Other applications could deliberately delete important artefacts such as messages and logs to hide digital footprint of a crime taken place in a smartphone. This complexity of anti-forensics hardens the job of forensic analysts [5], [7]. There is a spread of applications used to erase evidences that can be used by forensics analysts. Wickr [8], is an application designed to hide digital traces from governments or companies. It supports 256-bit AES symmetric encryption and RSA 4096 encryption and works without relying on their PGP key and the end to end encryption. Such application elevates the challenge faced by mobile forensics scientists. "Data acquisition from Smartphoneis the process of imaging or otherwise obtaining information from a digital device and its peripheral equipment and media [9]".Acquisition of data imaging from the mobile is critical. Procedures and standards should be observed during data acquisition, transportation and storage. An investigation should also be properly conducted inorder to remedy any loss of information, battery power loss or device selflocking. Contemporaneous notes should be taken at all times, ensuring that the smartphones are secured within a faraday bag/cage, or ensure that the device s SIM cards have been removed in order to ensure that the device is not receiving or sending data whilst carrying out the tests. Detailed inspection of devices should be carried out to identify their legitimacy and that they are in fact products produced by the said company (There are many fake mobile phones on the market). A dedicated laboratory environment should be available to correctly acquire and handle forensic evidence from the acquisitioned data. II. SIGNIFICANCEOF THE PAPER Cybercrime is a serious challenge that harms governments and individuals in today s world. A Symantec report in September 2011 on cybercrime states that the annual cost of cybercrime worldwide now totals $114 billion, affecting more than a million victims a day. The spread of Smartphone, with their rapidly evolving technology, has become inviting to hackers. Smartphones are almost full-fledged computers. Some phones, such as the iphone, now have over half a million applications, leading to their gradual displacement of traditional computers [10]. The number of mobile phone subscribers in the world in 2011 has increased to almost six billion users of phones that connect to Internet Service Providers (ISPs), according to International Telecommunication Union (ITU) statistics [11]. Moreover, when comparing Internet and fixed line subscriptions, the trend of Global Information and Communications Technology development in 2001 through 2011 shows mobile cellular telephone subscriptions as having the highest increases. All of these reasons and more have helped to spread the emergence of many hackingbased crimes aimed at smartphones. In this paper, we demonstrate through experiment, the tools that can be used to extract artefacts from a smartphone that is a central piece of evidence in a legal case. A real legal case from the Sultanate of Oman involving smartphone crime is considered. The data in the smartphone will be extracted and analysed to later line-up digital evidences that will help solve a legal case. III. SMARTPHONE FORENSICS CASE STUDY Evidence collection from Smartphone is very crucial. Extracting data, preserving them, building hypothesis and presenting digital evidences can all aid in solving legal cases. In this paper, a real legal case from the Sultanate of Oman is considered. A hypothesis will be established and two different software tools will be used to simulate data extraction to help solve a legal case. Incident summary: an organization (P) received a complaint from a user (Ali) explaining that his mobile phone had been hacked. His contact list has been receiving text messages through a popular chatting application, WhatsApp. However, Ali claims that he has not been sending any messages from his mobile. After accepting the case, the investigators started looking at the logs and records of this incident, and began a trace from Ali s Internet Service Provider (ISP). In the technical report provided by the ISP, there are two registers of messages for servers of mobile phones: the sender register and the receiver register. The report indicates that the messages were actually received by Ali s contact list. However, there was no record of his mobile having sent any messages. The mobile phone used in this case was an iphone running on ios operating system. Based on ISP s report, Ali is innocent in this case. However, there is a need to know how was Ali s phone compromised and used to send messages to Ali s contacts. Ali s phone was not available for testing due to legal constraints. There was a need to simulate the events to better understand the ways by which Ali s phone was compromised. To carry out digital forensics and to better understand how such a compromise can take place, a phone from the same brand as Ali s phone should be examined and WhatsApp data should be extracted. There are many tools used in smartphone s forensics. Two of the most popular tools are the Oxygen Forensic Suite and theufed physical Analyzer Cellebrite. Both tools are industry leading and widely accepted by forensics experts for providing accurate and verifiable results during forensics analysis. The tools also scored high in Hoog s analysis of smartphone forensics tools [7]. 577
3 A. Smartphone Testing The Smartphone was tested usingoxygen Forensic Suite and UFED physical Analyzer. Initial findings show that the smartphone is an iphone4 runningios jailbroken. Crucial pieces of information to be extracted are the International Mobile Equipment Identification (IMEI) number, International Mobile Subscriber Identity (IMSI) and Integrated Circuit Card ID (ICCID). These technical details help assuring the subscriber s identity and aid in extracting call logs and history from the service provider. B. Oxygen Forensic Suite Finding The investigation with Oxygen forensic suite find the most valued information such as IMEI, IMSI and ICCID in such mobile that used in given crimes scenario. Fig. 1shows the information that will help the investigators to identify the primary evidence that is required. Fig. 1. Oxygen forensic display The case involves WhatsApp fraud; therefore, information about WhatsApp messages is found. TheOxygen Forensic Suiteused in this experiment is a freeware hence there are limitations in the amount of information that can be extracted. C. UFED Physical Analyzer Cellebrite Finding Using a single tool for forensic analysis is not conclusive. Most forensic experts recommend using more than one tool to extract concrete evidences that can be used in the court. The smartphone was tested using UFED physical analyzer cellebriteto widen the search space for evidence.smartphone data was extracted by the software. The software extracted critical information that can help the forensic analysis such as call logs and message history [12]. The Artefacts showing the installation of WhatsApp application in the smartphone are shown in Fig. 2. Fig. 2. WhatsApp installed in the mobile Another artefact that shows the interfaces which have been logged in and which have sent WhatsApp messages gives more insight on the techniques used to send the messages. Fig. 3 shows three Wi-Fi access interfaces that 578
4 can act as evidence. Smartphone forensics investigator can make use of information such as connection time and date to generate evidence that can help solve a legal case. Fig. 3. Interfaces available in the mobile D. Comparison of Findings for Both Tools Table I shows a comparison between the artefacts extracted from the smartphone using Oxygen and UFED tools. TABLE I: COMPARISON OF FINDING FOR BOTH TOOLS iphone Oxygen Forensic Suite 2012 UFED physical analyzercellebrite Phonebook (118 Deleted) Messages (SMS) (1649 Deleted) Event log (5 Deleted) Images Audio Videos Database Files Web Connection and IP Connections WiFiconnections 3 IP connections 116 WiFiconnections 3 IP connections 39 Applications User application System application 45 Google Mail User data 38 Application files 8 Application log 0 Application information (118 Deleted) WhatsApp Messenger User data 924 Application files 78 Application log 0 Application information (3 Deleted) WhatsApp and Viber messages Web History - 9 Cookies - 34 Passwords - 89 User Account - 8 Web bookmarks - 28 (1 Deleted) Although Oxygen has limited access to the device but it generallygives more information about WhatsApp application compared to UFEDphysical Analyzer. The comparison shows that each tool excels in extracting specific type of information useful for forensic analysis. For example, information like images and contact numbersare better extracted by the UEFS physical Analyzer compared to Oxygen. On the other hand, Oxygen outperforms UFED in extracting data from messaging services such as WhatsApp. E. Final Findings The ISP confirmed earlier that Ali did not send WhatsApp messages. On the other hand, Ali s contacts received WhatsApp messages from Ali s phone. To simulate the scenario, a similar device was tested using Oxygen Forensics and UFED physical analyser. It was found that WhatsApp messages do not necessarily require cellular communications to be delivered. WhatsApp messages can also be delivered over Wi-Fi network. From the abovementioned facts we can derive two possible compromise scenarios. Scenario A, the Subscriber Identity Module (SIM) card was removed and the attacker used Wi-Fi network to deliver WhatsApp message. Scenario B, Ali sold his smartphone but didn t delete WhatsApp application and the new owner used a Wi-Fi network to deliver WhatsApp messages to Ali s contacts. IV. CONCLUSION Procedures for carrying out forensic analysis should be conducted in accordance with appropriate guidelines, particularly for evidence handling.firstly, regarding the problem of the WhatsApp application, the analysis of the suspect device should be carried out using suitable mobile forensic software such as Oxygen Forensic Suite and UFED physical from Cellebrite, within a controlled environment while ensuring that evidential and continuity of evidence is maintained. Cross examination of all data extracted from testing tools with logs from ISP should be compared and evaluated and the findings reported. Dates and times are relevant in this case; also, the IMEI, IMSI and the ICCID number of the 579
5 device and SIM card can be compared with the relevant logs. Logs from the Network ISP should be obtained and compared with the logs contained within the device. Investigators should provide a report that details their actions and findings and possibly comment on what they consider might have happened. The analysis should be conducted in such a manner that another expert could replicate the work and produce the same findings.if the forensic software is unable to retrieve the specific data, a physical examination may be carried out, providing photographs of the specific requested evidence. REFERENCES [1] N. Al Mutawa, I. Baggili, and A. Marrington, Forensic analysis of social networking applications on mobile devices, Digital Investigation, vol. 9, pp. S24-S33, [2] L. S. Ashiho. (2003). [Online]. Available: Mobile-tech.pdf. [3] E. Casey, Digital Evidence and Computer Crime, [4] A. Hoog, iphone and ios Forensics: Investigation, Analysis and Mobile Security for Apple iphone, ipad and ios Devices, Syngress Publishing, June [5] A. Distefano, G. Me., and F. Pace, Android anti-forensics through a local paradigm, Digital Investigation, vol. 7, pp. S83-S94, August [6] M. A. Caloyannides, Computer Forensics and Privacy, Artech House, [7] A. Hoog. (November 2010). Independent research and reviews of iphone forensic tools. via forensics. [Online]. Available: [8] K. Jackson. (2012). Dark Reading. [Online]. Available: security/ /security/encryption/ /free-app- encrypts-destroys-mobile-messages.html. [9] W. Jansen. (2007). National Institute of Standards and Technology, [Online]. Available: [10] Norton. (2011). Symantec. Norton study calculates cost of global cybercrime: $114 billion annually. [Online]. Available: 907_02. [11] International Telecommunication Union. (2012). Key statistical highlights: ITU data release June [Online]. Available: %20highlights_June_2012.pdf. [12] Cellebrite. [Online]. Available: Mubarak Al Hadadi received B.Eng degree in hardware and network from Middle East College, Sultanate of Oman 2008; in 2012 hold Master degree in Science in information Technology (MSc-IT) from Coventry University UK, graduated distinction. A professionally qualified and experienced, Information Security and Chief Information Security Officer (CISO) qualification with a personal passion for achieving results, leading network security team, Sultanate of Oman.His research interest in Smartphone forensic. Ali Al Shidhani received the B. Eng. degree in electrical and electronics engineering from Sultan Qaboos University, Sultanate of Oman, in 2001; the Master s degree in data communications from Queensland University of Technology, Australia, in 003. He received Ph.D. degree in electrical and computer engineering from the University of British Columbia, Canada, in He is currently an Assistant Professor at the Department of Electrical and Computer Engineering at Sultan Qaboos University, Sultanate of Oman. His research interest includes authentication in wireless networks. 580
A Survey on Mobile Forensic for Android Smartphones
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Cellebrite UFED Physical Pro Cell Phone Extraction Guide
Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research
TRACING VNC AND RDP PROTOCOL ARTEFACTS ON WINDOWS MOBILE AND WINDOWS SMARTPHONE FOR FORENSIC PURPOSE
TRACING VNC AND RDP PROTOCOL ARTEFACTS ON WINDOWS MOBILE AND WINDOWS SMARTPHONE FOR FORENSIC PURPOSE Abstract Paresh Kerai School of Computer and Security Science Edith Cowan University Perth, Western
Design and Implementation of Forensic System in Android Smart Phone
Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National
A Review of Different Comparative Studies on Mobile Operating System
Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September
The Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Cell Phone Forensics For Legal Professionals
1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
Formal Education: Professional Qualifications: Professional Awards: Membership/Networking:
Formal Education: (some) 2006: Indonesian Advanced Police College Award: The Best Graduate in Academic 2009: MSc in Forensic Informatics, University of Strathclyde, UK Final Result: Distinction for Dissertation
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
Evolution of Smartphones And Android Operating System
Evolution of Smartphones And Android Operating System Evolution of Smartphones Background First telephone call was made on March 10, 1876 by Alexander Graham Bell. After that Pager continues to dominate
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
Cloud Computing Architecture and Forensic Investigation Challenges
Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional
Forensic Acquisition and Analysis of Tango VoIP
Forensic Acquisition and Analysis of Tango VoIP Nhien-An Le-Khac*, Christos Sgaras, and M-Tahar Kechadi School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4, Ireland.
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
Security Threats for Mobile Platforms
Security Threats for Mobile Platforms Goran Delac Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia Abstract - The proliferation of smart-phone devices, with ever advancing
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
Mobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Exactly the Same, but Different
Exactly the Same, but Different 1 Shayne Champion, CISSP, CISA, GSEC, ABCP Program Manager GO Cyber Security TVA v1.0 Agenda Define Mobile Device Security o o Similarities Differences Things you Should
2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
Spring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER
WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
Enterprise Mobile Threat Report
Enterprise Mobile Threat Report The State of ios and Android Security Threats to Enterprise Mobility I. Introduction This report examines enterprise security threats for ios and Android. While Android
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Review and Evaluation of Performance Measures in the Mobile Operating Systems
International Journal of Scientific & Engineering Research Volume 4, Issue3, March-2013 1 Review and Evaluation of Performance Measures in the Mobile Operating Systems Farhad Soleimanian Gharehchopogh,
How To Protect Your Privacy On An Apple Iphone Or Ipod
Legal Process Guidelines U.S. Law Enforcement apple These Guidelines are provided for use by law enforcement or other government entities in the U.S. when seeking information from Apple Inc. ( Apple )
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
I-Phone in the Mobile Phone Market in the UK
I-Phone in the Mobile Phone Market in the UK 1 2 DECLARATION I...assure that this project work is my own and is written in my own words. All the external information for the completion of the project in
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization
Flinders University. Telehealth in the Home. Video Strategy Discussion Paper. 2 October 2013
Flinders University Telehealth in the Home Video Strategy Discussion Paper 2 October 2013 Further information: Alan Taylor, Project Manager [email protected] Page 1 of 14 A AUTHORS A.1 Project
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013 FORENSIC ACQUISITION.BEFORE STARTING When we are dealing with the forensics acquisition of an ios device
Validating Tools for Cell Phone Forensics
Validating Tools for Cell Phone Forensics Neil Bhadsavle and Ju An Wang Southern Polytechnic State University 1100 South Marietta Parkway Marietta, GA 30060 (01) 678-915-3718 {nbhadsav, jwang}@spsu.edu
MaaS360 Mobile Device Management (MDM) Administrators Guide
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
Legal Process Guidelines
apple Legal Process Guidelines EMEIA Law Enforcement These guidelines are provided for use by law enforcement or other government entities in the EMEIA (Europe, Middle East, India, Africa) geographical
Network Test Labs (NTL) Software Testing Services for igaming
Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs
Mobile Application Testing
Mobile Application Testing Whitepaper Author: Scott Aziz Date: June 1, 2012 This whitepaper outlines the critical areas of testing needed to certify mobile enterprise applications Best practices from UST
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone
