List the six types of mobile forensics methods as defined by NIST guidelines, and describe each method.

What will be an ideal response?


?The six types of mobile forensics methods defined by NIST guidelines are:Manual extraction--If investigators can't do a logical or physical extraction, this method involves looking at the device's content page by page and taking pictures.Logical extraction--The mobile device is connected to a forensic workstation via a wired (USB cable, for example) or wireless (such as Bluetooth) connection, and then a forensic copy of the device is made.Hex dumping and Joint Test Action Group (JTAG) extraction--Hex dumping involves using a modified boot loader to access the RAM for analysis. The JTAG extraction method gets information from the processor, flash memory, or other physical components. It's a highly invasive method.Chip-off--This method requires physically removing flash memory chip and gathering information at the binary level.Micro read--This method looks at logic gates with an electron microscope and can be used even when data has been overwitten on magnetic media. It's very expensive, however, so it's typically used only in cases involving national security.

Computer Science & Information Technology

You might also like to view...

What are the two basic communication paradigms used in the Internet?

What will be an ideal response?

Computer Science & Information Technology

When you are satisfied with your edited video, the next step is to specify ____ settings.

A. movie B. input C. DVD D. output

Computer Science & Information Technology

The __________ method is used to specify what the speech synthesizer will speak.

a) speakPlainText b) say c) voice d) None of the above.

Computer Science & Information Technology

Which of the following states does not have security breach law?

A. Alabama B. Texas C. California D. Massachusetts

Computer Science & Information Technology