352
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      One-Click Submission System Now Available for SO Preprints, learn more on how this works in our blog post and don't forget to check the video, too!

      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Mobile forensics techniques, tools and intrusion detection : : Mobile devices, mobile forensics, forensics tool, Forensics law.

      Preprint
      In review
      research-article
        1 ,
      ScienceOpen Preprints
      ScienceOpen
      Mobile devices, mobile forensics, forensics tool, Forensics law

            Abstract

            As the number and type of mobile devices increasers, so does its popularity thus making it a crucial part of one’s life. This super involvement of these devices makes them prone to anti-social behavior of humans like crime and stuff. This makes mobile devices an integral part of forensic procedure. The goal of the mobile forensic procedure is to retrieve digital evidence or relevant data from a mobile device in such a way that the evidence is preserved in a forensically sound state. To achieve this, the mobile forensic procedure must start with precise guidelines for seizing, isolating, transporting, storing for investigation, and proofing digital evidence coming from mobile devices. The process of mobile forensics is usually similar to that of other fields of digital forensics. However, it is important to note that the mobile forensics process has its own unique characteristics that must be taken into account. Correct approach and guidelines may be a necessary precursor for successful outcomes when examining mobile devices.

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            9 March 2023
            Affiliations
            [1 ] ;
            Author notes
            Author information
            https://orcid.org/0009-0000-4589-7331
            Article
            10.14293/S2199-1006.1.SOR-.PPTQSCP.v1
            78497899-eadf-4f7e-bf3e-9ab312c00fb4

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 9 March 2023
            Categories

            All data generated or analysed during this study are included in this published article (and its supplementary information files).
            Security & Cryptology,General computer science
            Mobile devices,forensics tool, mobile forensics,Forensics law

            Comments

            Comment on this article