Mobile Devices in Electronic Discovery
|
|
|
- Christian Chambers
- 10 years ago
- Views:
Transcription
1 Mobile Devices in Electronic Discovery
2 Mobile Devices in Electronic Discovery Abstract Once upon a time they were used to make phone calls; now they are our mobile offices. Mobile devices are a prolific aspect of modern society. For the majority of people, they serve as a primary means of communication both active and passive as well as management systems for daily activities. Today s smart phones offer a broad variety of capabilities, many of which were once only available on computers. Mobile devices have the ability to store our text messages, s with attachments, photos, videos, and web browsing histories. They support third-party chat applications like Viber or Skype and even hyper-sophisticated calendar applications such as PocketLife, which tracks the date/time and geolocation of the user. Recently, proper preservation and production of SMS messages from mobile devices has become a key issue in ediscovery. In 2013 an Illinois court issued the Defendant sanctions of more than $900,000 USD for, among other things, failing to preserve and produce text messages (in re: Pradaxa 1 ). The volume of mobile device data is increasing, and as business and mobile devices become ever more closely intertwined, the potential responsiveness of mobile device data is equally on the rise. Matters involving mobile devices are far more fluid and dynamic than traditional computer forensic matters (think hard drives) because the technology can be quite volatile. These challenges, coupled with the continuous and rapid evolution of available mobile device technologies, require Digital Forensic Investigators to keep a close eye on best practices for managing forensic acquisition and analysis of mobile device data. OVERVIEW It is rare to conduct an investigation or ESI preservation effort that does not involve a mobile device. A recent survey 2 indicated the following: 90% of American Adults have a cell phone 58% of Americans have a smart phone 32% of Americans own an e-reader 42% of Americans own a tablet computer 29% of American cell phone owners describe their devices as something they cannot imagine living without 2. They cannot live without their devices because everything is there. They can send and receive , read or edit documents, get directions, check the news, check their Twitter, Instagram, Facebook accounts, calendar their appointments, send text messages to friends, and engage in a host of other personal and work-related activities. What used to require a full-size computer is now handled by a powerful, portable device. TERMINOLOGY Forensic collection of mobile devices: Acquisitions of mobile devices are a snap shot in time. They are so volatile and constantly changing that two separate acquisitions will likely never yield the exact same data. If nothing else, dates and times of items will constantly be altered. Mobile Application Management ( MAM ): Distributing, managing, and tracking mobile applications via software and services. Jailbreak (ios): This is a method of device modification which is applicable to ios devices only. It allows an end-user to have super control over their Apple device. It turns the device from
3 a read-only system, on which only App Store approved programs can be loaded, into an openended system on which all kinds of third-party software (including malware) can be installed. ios devices that are already jail broken by an end-user can be easier for forensic examiners to acquire, in some instances. In the field of digital forensics, terminology and concepts can evolve rapidly. It s cri cal to remain up-to-date with emerging acronyms and defini ons as well as technologies and methods. vulnerability for certain U.S. celebrities whose accounts were hacked, resulting in theft of their private photographs. Apple has since invoked two-form authentication for Apple ID, which is how users log in to icloud. MOBILE DEVICE MANAGEMENT Mobile Device Management solutions are a growing enterprise in their own right, allowing employers to manage the hordes of varying Android and Apple devices containing their often-confidential ESI. An MDM solution allows administrators to manage aspects of a mobile Android Rooting: Rooting an Android-style tablet or phone is akin to the ios jailbreak method it allows an end-user to manipulate and modify the inner-most parts of the phone. TYPES OF MOBILE PHONE ESI A mobile device can typically contain , text messages, documents, calendars, contacts, call logs, voice mail (visual voice mail is also stored on the device) graphics and video files. An overwhelming majority of user data and evidence is found within databases (typically SQLlite format). Mobile forensic tools as well as standalone database forensic software are used to parse the contents of these databases for easy-to-read reporting. SQLlite databases may also contain deleted records that have not yet been purged. THE CLOUD: AN IMPORTANT POTENTIAL SOURCE OF MOBILE ESI Cloud backups represent an important source of mobile ESI. For example, icloud can store documents, contacts, pictures, and much more. This area of storage can be useful for examiners and litigators, and was recently an area of Fig 1. icloud configuration options. A wide variety of data types can be backed up in the cloud.
4 device including, (a) what kind of pin code or password is required for the device itself; (b) if and how data should be encrypted on the device; (c) the ability to wipe the phone if it is lost or stolen; and even (d) the ability to disable things like the phone s camera when inside sensitive areas of a company. Of these, encryption is one of the most attractive features of an MDM platform. Administrators can encrypt the phone itself, and also set a separate password to unlock the container housing the company s (think of it as a password protected ZIP file on your computer an added layer of protection). For preservation purposes, the MDM software isn t going to help, since you cannot collect remotely. (As of this writing there are no options for remote collection of mobile devices.) COMPUTER FORENSICS VS. MOBILE DEVICES: VOLATILITY Tablets and phones contain very small solid-state type chips for memory functions and storage, versus the spinning platter hard drives of formergeneration computers. There are two primary chip types: (1) NAND Flash and (2) NOR chips. The former are by far the most common and are cheapest to manufacture. NOR chips are typically used to store a type of software called firmware, which tells the phone what it is, how to turn on very basic instructions. NAND chips can be broken up into logical divisions called partitions (just like computer hard drives) and often have a few: one for mobile operating system code, one for restoration / fail-safe code, and one for what is normally referred to as a user partition. This area is where applications and user-created items are typically housed, and is an area of keen focus for ESI acquisition and investigations. NAND chip technology is small, cheap and quite fast; however, its volatility comes into play when things like wear leveling and garbage collection are considered. Wear leveling is a process that essentially spreads the writing of data across the tiny NAND chip so that no single area takes all of the abuse involved in said data writes imagine hitting only the 15 wedge on a dartboard over and over throughout your games. The developers of these chips employ this method to improve shelf life of their hardware, but it can create both problems and opportunities for the forensic examiner: in some situations, wear leveling can cause data loss; in others, it can mean that data was arbitrarily moved before a deletion event, therefore leaving behind some traces. Figure 2: Touchdown MDM PIN Code to access (source: nau.edu)
5 ACQUISITION TYPES FOR MOBILE DEVICES In order of least thorough to most complete: Logical: Active data only: from call log databases, SMS messages etc., File System: Same as logical, but will also contain all contents of the file system(s), the databases themselves and other items better for analysis. Physical: Both active and deleted data are acquired. Acquires file systems in their entirety as well as free space on the flash chips. Is akin to a computer hard drive image, but not verifiable in the same way. Is not available on all devices. Manual: scroll and photograph / video record MOBILE PHONE FORENSIC TOOL EXAMPLES a. Cellebrite UFED and Physical Analyzer b. Oxygen Forensic Analyst Suite c. Blacklight for ios Devices d. Lantern e. XRY These tools can all acquire and analyze a broad array of mobile devices but often times much to the dismay of examiners two different tools assessing the same mobile device can yield entirely different results (as seen in Figure 3.) Some tools do not parse databases correctly and miss various call detail records, or get the right records but misrepresent the associated dates and times. It takes a trained examiner with a variety of tools to adequately extract and assess mobile phone data. It is important to not let a single tool have the final say. ios DEVICES ios devices have an equally large market share compared to their Android counterparts and come with their own unique challenges. A few key things to know: a. To date examiners are unable to acquire data from iphone 4S, 5, 5c, 5s, ipad 2, 3 and Air devices. can be extracted from the original ipad, as well as from the iphone 4 and older devices, as the early generation technologies could not yet encrypt . Figure 3: Different tools can report findings in different ways.
6 b. Examiners must have passwords or PIN codes for the home screen of ios devices, as there is no way to circumvent the PIN code in most cases (unless the phone is a 4 or below and/or the device was jail broken ahead of time by an end-user). c. If a backup password was set this is different form an itunes/apple ID and PIN code this will be required to extract file system or logical data (this can possibly be circumvented in some instances, by way of something called an Advanced Logical Extraction). d. itunes sometimes creates backups of ios automatically, when the device is attached to the computer. Examiners can parse these backups with forensic tools (see examples on the facing page.) These same types of backups can be gathered from icloud if the user had this option enabled. There are very few reliable methods to acquire data from these repositories, but Altep s examiners are equipped to do so completely and correctly. ANDROID EXAMPLES Within the Android arena, applications are much more open-ended and generally less secure. Applications come and go, and need not be signed or proven to be safe, unlike apps which are available in the ios Appstore. Android applications come in the form of.apk files, and are often manipulated by hackers to gain control of the device and steal personal information. However, Forensic Examiners can assess Android applications for signs of infection or data egress. Regarding backups of Android data, a few thirdparty backup tools are available, but these are not widely used and are rarely encountered by Examiners. Most user-created data on an Android device is backed up to the phone s registered Google account. CERTIFICATION EXAMPLES Cellebrite Certified Logical Operator (CCLO) Cellebrite Certified Physical Analyst (CCPA) AccessData Mobile Phone Examiner (AME) Blackbag Tech Mac and ios Certified Forensic Examiner (MiCFE) Figure 4: If enabled, the passcode will be required before acquisition can occur.
7 Figure 5: Parsing a backup of SMS messages Figure 6: Various types of data can be collected.
8 Seattle San Francisco Palo Alto San Diego Phoenix El Paso Dallas Houston Bentonville Chicago Atlanta Red Bank About Our Experts Warren G. Kruse II, CISSP, CFCE, EnCE, DFCP Vice President, Digital Forensics, Altep, Inc. With more than 30 years experience in law enforcement and forensic science, Warren is the author of Computer Forensics: Incident Response Essentials. The diverse range of matters Warren has assisted with includes theft of trade secrets, Wikileaks investigations, misappropriation of intellectual property, breach of contract, internal employment disputes, fraud investigations, and wage and hour class actions, among others. Warren currently serves as the President of the Digital Forensics Certification Board. London Dublin Timothy LaTulippe, CCE, EnCE, MiCFE, NECS, DFCP Senior Computer Forensic Manager, Altep, Inc. Timothy has served as an expert witness in a variety of State, Federal and military proceedings. His broad experience includes matters involving trade secret theft, medical malpractice, intellectual property theft, unfair business practice, fraud and internal investigations. Additionally, Timothy is the author of Working Inside the Box: Real Life Example of GDS ina Forensic Examination, which was published in The Journal of Digital Forensics Security & Law, and The Need for Targeted Collections in a Diminished Economy. 1 In re Pradaxa (Dabigatran Etexilate) Prods. Liability Li g., No. 12- md-2385, 2013 WL , at *17, *20 (S.D. Ill. Dec. 9, 2013) Altep, Inc. All Rights Reserved.
BEST PRACTICES FOR A COLLECTION OF AN IOS MOBILE DEVICE
BEST PRACTICES FOR A COLLECTION OF AN IOS MOBILE DEVICE by Richard A. Rodney As the use of ios devices continues to proliferate in the business space, they present some unique challenges when data must
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013 FORENSIC ACQUISITION.BEFORE STARTING When we are dealing with the forensics acquisition of an ios device
Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
Exactly the Same, but Different
Exactly the Same, but Different 1 Shayne Champion, CISSP, CISA, GSEC, ABCP Program Manager GO Cyber Security TVA v1.0 Agenda Define Mobile Device Security o o Similarities Differences Things you Should
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5
Smart Ideas for Smartphone Security
Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone
How to wipe personal data and email from a lost or stolen mobile device
IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or
Pryvate App User Manual
Pryvate App User Manual 2.0 Powered by Criptyque Pryvate is the most secure voice, email & chat app for business people & individuals that require a high level of communications encryption to protect their
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida
2015 SCCE Compliance & Ethics Institute Wednesday, October 7, 2015 (10:00 11:45) Session W14 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks, and
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
White Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE
2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly
Your Employee May Be Wearing Their Alibi - Or Your Evidence
Digital Forensics TECHNICAL ARTICLE Your Employee May Be Wearing Their Alibi - Or Your Evidence Warren Kruse, CISSP, CFCE, EnCE, DFCP Vice President for Digital Forensics About the Author Warren G. Kruse
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
White Paper. Data Security. journeyapps.com
White Paper Data Security CONTENTS The JourneyApps Commitment to Security Geographic Location of Cloud Hosting Infrastructure-Level Security Protection of Data Through Encryption Data Life Cycle Management
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
Apple Deployment Programs Apple ID for Students: Parent Guide
Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
Regular contributor to the IACIS, CDFS, HTCC, DFCB, ISFCE and peer journals such as the JDFSL and Computers & Security.
Digital Forensics Name: Title: Address Phone: email: Timothy LaTulippe, EnCE, CCE, MiCFE, CCPA, DFCP Director of Digital Forensics - West Coast, Altep, Inc. 255 California Street, Suite 500 San Francisco,
1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.
Collaboration Collaboration simply means to work together and that is exactly what Yosemite and ios 8 do for individuals and organisations. Quite often organisations face challenges around how to get technology,
SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
LabTech Mobile Device Management Overview
You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated
Mobile Security Standard
Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: [email protected] Mobile Security Standard
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com
We secure your information world www. Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?. IOS Feature 1 Single Sign-on Previously available for multiple apps developed
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
Mobile Devices Using Without Losing
Mobile Devices Using Without Losing Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Tech Briefing 30March 2012 We all have mobile devices iphones,
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015
Protecting your Data, Devices, and Digital Life in a BYOD World: A Security Primer GLENDA ROTVOLD AND SANDY BRAATHEN NBEA APRIL 2, 2015 What are You Trying to Protect? If someone got into your email, what
platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
Tom Schauer TrustCC [email protected] 253.468.9750 - cell
Tom Schauer TrustCC [email protected] 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
AirWatch for Android Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
Digital Security. Dr. Gavin W. Manes, Chief Executive Officer
Dr. Gavin W. Manes, Chief Executive Officer About Us Avansic E-discovery and digital forensics company founded in 2004 by Dr. Gavin W. Manes, former Computer Science professor Scientific approach to ESI
Cell Phone Forensics For Legal Professionals
1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
Bring Your Own Device Policy
Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Students Mobile Messaging Registration & Configuration
Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
Comodo Mobile Security for Android Software Version 3.0
Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile
Data Storage on Mobile Devices Introduction to Computer Security Final Project
Data Storage on Mobile Devices Introduction to Computer Security Final Project Katina Russell Tufts University, Fall 2014 Abstract While people come up with ideas about a mobile application to create,
Managing Mobility. 10 top tips for Enterprise Mobility Management
Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind
Apple Configurator MDM Site - Review
Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?
APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES
APPLE & BUSINESS ios ENTERPRISE SECURITY Apple have had an uphill battle getting into businesses for many years the Windows monopoly Phones provided another attempt Blackberrys and Windows Mobile were
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Health Science Center AirWatch Installation and Enrollment Instructions For Apple ios 8 Devices
Health Science Center AirWatch Installation and Enrollment Instructions For Apple ios 8 Devices Following are the steps necessary to register and enroll an Apple ios 8 device with the University s AirWatch
Smartphone Forensics Analysis: A Case Study
Smartphone Forensics Analysis: A Case Study Mubarak Al-Hadadi and Ali AlShidhani Abstract Smartphone forensics is a sub-set of digital forensics, and refers to the investigation and acquisition of artefacts
C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.
Questionnaire on Electronically Stored Information (May 2014) Comment The Questionnaire is intended to be a comprehensive set of questions about a company s computer systems. The extent to which you should
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES MARCH 2013 AGENDA Introduction About BDO Consulting Computer Forensics & E-Discovery Practice Current Trends Case Studies Q&A Page 2 Michael Barba Managing Director,
Codeproof Mobile Security & SaaS MDM Platform
Codeproof Mobile Security & SaaS MDM Platform [email protected] https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,
Hard vs. Soft Tokens Making the Right Choice for Security
Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics
Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
How To Answer A Question About Your Organization'S History Of Esi
Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure.
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
A Survey on Mobile Forensic for Android Smartphones
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones
Successful ediscovery in a Bring Your Own Device Environment
IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Security and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, [email protected]
Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11
Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about
Mobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com
Mobile Device Management (MDM) Policies Best Practices Guide www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
Getting to know your ipad For Beginners
Getting to know your ipad For Beginners In this guide you will learn how to: o Switch your device on/off. o Tap, swipe, and pinch to navigate your device. o Secure your device set a password. o Change
