Published: July 24, 2008
Author(s)
Wayne Jansen, Aurelien Delaitre
Conference
Name: 2008 International Conference on Security and Management (SAM 2008)
Dates: 07/14/2008 - 07/17/2008
Location: Las Vegas, Nevada, United States
Citation: Proceedings of the 2008 International Conference on Security & Management (SAM 2008), pp. 171-177
Phone managers are non-forensic tools sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available for the device. While precautions can be taken to preserve the integrity of data on a cell phone, inherent risks exist. Applying a forensic filter to phone manager exchanges with a device is suggested as a safer alternative that could be pursued as a solution to reduce risk.
Phone managers are non-forensic tools sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available for the device. While precautions can be taken to preserve the integrity of data on a cell phone, inherent risks exist. Applying a forensic...
See full abstract
Phone managers are non-forensic tools sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available for the device. While precautions can be taken to preserve the integrity of data on a cell phone, inherent risks exist. Applying a forensic filter to phone manager exchanges with a device is suggested as a safer alternative that could be pursued as a solution to reduce risk.
Hide full abstract
Keywords
cell phone; computer forensics; protocol filter
Control Families
None selected