Normal view MARC view ISBD view

iPhone and iOS Forensics : Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices.

By: Hoog, Andrew.
Contributor(s): Strzempka, Katie.
Material type: TextTextSeries: eBooks on Demand.Publisher: Saint Louis : Elsevier Science, 2014Copyright date: ©2011Description: 1 online resource (327 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9781597496605.Subject(s): Data recovery (Computer science) | iOS (Electronic resource) | iPad (Computer) | iPhone (Smartphone)Genre/Form: Electronic books.Additional physical formats: Print version:: iPhone and iOS Forensics : Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS DevicesDDC classification: 005.86 LOC classification: QA76.8.I64 -- H665 2011Online resources: Click here to view this ebook.
Contents:
Front Cover -- iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad, and iOS Devices -- Copyright -- Contents -- Acknowledgments -- Preface -- About the Authors -- About the Technical Editor -- Chapter 1: Overview -- Introduction -- Strategy -- Development community -- iPhone models -- iPhone hardware -- Forensic examination approaches -- iPhone leveling -- Acquisition types -- Forensics with Linux -- Summary -- References -- Chapter 2: Device Features and Functions -- Introduction -- Apple device overview -- Operating modes -- Normal mode -- Recovery mode -- DFU mode -- Exiting Recovery/DFU mode -- Security -- Device settings -- Secure erase -- App security -- iTunes interaction -- Device synchronization -- iPhone backups -- iPhone restore -- iPhone iOS updates -- Upgrade -- Downgrade -- The App Store -- MobileMe -- Summary -- References -- Chapter 3: File system and data storage -- Introduction -- What data is stored -- Where data is stored -- How data is stored -- Internal storage -- SQLite database files -- Property lists -- Network -- Memory types -- RAM -- NAND Flash -- iPhone operating system -- iOS layers -- File system -- Volumes -- Journaling -- iPhone disk partitions -- Summary -- References -- Chapter 4: iPhone and iPad Data Security -- Introduction -- Data security and testing -- Computer crime laws in the United States -- Data protection in the hands of the administrators -- Security testing procedure -- Application security -- Corporate or individual mobile app consumers -- Corporate or individual mobile app developers -- Application security strategies for developers -- Recommendations for device and application security -- Summary -- References -- Chapter 5: Acquisitions -- Introduction -- iPhone forensics overview -- Types of investigations.
Difference between logical and physical techniques -- Modification of the target device -- Handling evidence -- Passcode procedures -- Network isolation -- Powered-off devices -- Imaging an iPhone/iPad -- Backup acquisition -- Logical acquisition -- Physical acquisition -- Imaging other apple devices -- iPad -- iPod Touch -- Apple TV -- Summary -- References -- Chapter 6: Data and Application Analysis -- Introduction -- Analysis techniques -- Mount disk image -- File carving -- Strings -- Timeline development and analysis -- Forensic analysis -- iPhone data storage locations -- Default applications -- Downloaded apps -- Other -- iPhone application analysis and reference -- Default applications -- Third-party (downloaded) applications -- Summary -- References -- Chapter 7: Commercial tool testing -- Introduction -- Data population -- Analysis methodology -- Cellebrite UFED -- Installation -- Forensic acquisition -- Results and reporting -- iXAM -- Installation -- Forensic acquisition -- Results and reporting -- Oxygen forensic suite 2010 -- Installation -- Forensic acquisition -- Results and reporting -- XRY -- Installation -- Forensic acquisition -- Results and reporting -- Lantern -- Installation -- Forensic acquisition -- Results and reporting -- MacLock Pick -- Installation -- Forensic acquisition -- Results and reporting -- Mobilyze -- Installation -- Forensic acquisition -- Results and reporting -- Zdziarski technique -- Installation -- Forensic acquisition -- Results and reporting -- Paraben device seizure -- Installation -- Forensic acquisition -- Results and reporting -- MobileSyncBrowser -- Installation -- Forensic acquisition -- Results and reporting -- CellDEK -- Installation -- Forensic acquisition -- Results and reporting -- Encase Neutrino -- Installation -- Forensic acquisition -- Results and reporting -- iPhone Analyzer.
Installation -- Forensic acquisition -- Results and reporting -- Summary -- Reference -- Appendix A -- Appendix B -- Appendix C -- Index.
Summary: As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators. Learn techniques to forensically acquire the iPhone, iPad and other iOS devices Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.8.I64 -- H665 2011 (Browse shelf) http://ebookcentral.proquest.com/lib/uttyler/detail.action?docID=716264 Available EBC716264

Front Cover -- iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad, and iOS Devices -- Copyright -- Contents -- Acknowledgments -- Preface -- About the Authors -- About the Technical Editor -- Chapter 1: Overview -- Introduction -- Strategy -- Development community -- iPhone models -- iPhone hardware -- Forensic examination approaches -- iPhone leveling -- Acquisition types -- Forensics with Linux -- Summary -- References -- Chapter 2: Device Features and Functions -- Introduction -- Apple device overview -- Operating modes -- Normal mode -- Recovery mode -- DFU mode -- Exiting Recovery/DFU mode -- Security -- Device settings -- Secure erase -- App security -- iTunes interaction -- Device synchronization -- iPhone backups -- iPhone restore -- iPhone iOS updates -- Upgrade -- Downgrade -- The App Store -- MobileMe -- Summary -- References -- Chapter 3: File system and data storage -- Introduction -- What data is stored -- Where data is stored -- How data is stored -- Internal storage -- SQLite database files -- Property lists -- Network -- Memory types -- RAM -- NAND Flash -- iPhone operating system -- iOS layers -- File system -- Volumes -- Journaling -- iPhone disk partitions -- Summary -- References -- Chapter 4: iPhone and iPad Data Security -- Introduction -- Data security and testing -- Computer crime laws in the United States -- Data protection in the hands of the administrators -- Security testing procedure -- Application security -- Corporate or individual mobile app consumers -- Corporate or individual mobile app developers -- Application security strategies for developers -- Recommendations for device and application security -- Summary -- References -- Chapter 5: Acquisitions -- Introduction -- iPhone forensics overview -- Types of investigations.

Difference between logical and physical techniques -- Modification of the target device -- Handling evidence -- Passcode procedures -- Network isolation -- Powered-off devices -- Imaging an iPhone/iPad -- Backup acquisition -- Logical acquisition -- Physical acquisition -- Imaging other apple devices -- iPad -- iPod Touch -- Apple TV -- Summary -- References -- Chapter 6: Data and Application Analysis -- Introduction -- Analysis techniques -- Mount disk image -- File carving -- Strings -- Timeline development and analysis -- Forensic analysis -- iPhone data storage locations -- Default applications -- Downloaded apps -- Other -- iPhone application analysis and reference -- Default applications -- Third-party (downloaded) applications -- Summary -- References -- Chapter 7: Commercial tool testing -- Introduction -- Data population -- Analysis methodology -- Cellebrite UFED -- Installation -- Forensic acquisition -- Results and reporting -- iXAM -- Installation -- Forensic acquisition -- Results and reporting -- Oxygen forensic suite 2010 -- Installation -- Forensic acquisition -- Results and reporting -- XRY -- Installation -- Forensic acquisition -- Results and reporting -- Lantern -- Installation -- Forensic acquisition -- Results and reporting -- MacLock Pick -- Installation -- Forensic acquisition -- Results and reporting -- Mobilyze -- Installation -- Forensic acquisition -- Results and reporting -- Zdziarski technique -- Installation -- Forensic acquisition -- Results and reporting -- Paraben device seizure -- Installation -- Forensic acquisition -- Results and reporting -- MobileSyncBrowser -- Installation -- Forensic acquisition -- Results and reporting -- CellDEK -- Installation -- Forensic acquisition -- Results and reporting -- Encase Neutrino -- Installation -- Forensic acquisition -- Results and reporting -- iPhone Analyzer.

Installation -- Forensic acquisition -- Results and reporting -- Summary -- Reference -- Appendix A -- Appendix B -- Appendix C -- Index.

As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators. Learn techniques to forensically acquire the iPhone, iPad and other iOS devices Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system.

Description based on publisher supplied metadata and other sources.

There are no comments for this item.

Log in to your account to post a comment.