A Review on Mobile Device's Digital Forensic Process Models

@article{Farjamfar2014ARO,
  title={A Review on Mobile Device's Digital Forensic Process Models},
  author={Anahita Farjamfar and Mohd Taufik Abdullah and Ramlan Mahmod and Nur Izura Udzir},
  journal={Research Journal of Applied Sciences, Engineering and Technology},
  year={2014},
  volume={8},
  pages={358-366}
}
The main purpose of this study is to discuss the different comparative studies on digital forensics process models specially in the field of mobile devices. In order to legally pursue digital criminals, investigation should be conducted in a forensically sound manner so that the acquired evidence would be accepted in the court of law. Digital forensic process models define the important steps that should be followed to assure the investigation is performed successfully. There are a number of… Expand

Figures and Tables from this paper

Analisis Kelayakan Integrated Digital Forensics Investigation Framework Untuk Investigasi Smartphone
TLDR
The Integrated Digital Forensic Investigation Framework (IDFIF) is the latest developed method, so that it is interesting to further scrutinize IDFIF, particularly in the process of investigation of a smartphone. Expand
Comparative Evaluation of Mobile Forensic Tools
TLDR
The evaluation result showed that AccessData FTK imager and Paraben device seizure performs better than Encase and Mobiledit, and Encase could detect the unallocated space on the mobile deice but could retrieve an deleted data. Expand
Towards adapting metamodeling approach for the mobile forensics investigation domain
Mobile phones have become quite important tools in the modern world. The forensics field heavily relies on knowledge as an important resource. Due to the ongoing changes in digital technology, theExpand
A metamodel for mobile forensics investigation domain
TLDR
The developed approach contributes to identify common concepts of mobile forensics through a development of the Mobile Forensics Metamodel (MFM), which contributes to simplifying the investigation process and enables investigation teams to capture and reuse specialized forensic knowledge, thereby supporting the training and knowledge management activities. Expand
Law Enforcement educational challenges for mobile forensics
TLDR
This research finds that current education and training offerings mainly include topics regarding acquisition and analysis of mobile data, and trainer opinions on skills shortages include the lack of basic knowledge, generic skills in forensics and investigation, lack of skilled practitioners, and necessary mindsets to critically think, investigate and avoid dependency on Digital Forensic software. Expand
A cross-domain qualitative meta-analysis of digital forensics: Research trends, challenges, and emerging topics
TLDR
This work performed a qualitative meta-analysis of the literature in digital forensics, identifying key issues and challenges that spanned across different domains and allowed it to draw promising research lines, facilitating the adoption of strategies to address them. Expand
An effective approach to mobile device management: Security and privacy issues associated with mobile applications
Abstract Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is andExpand
Cybersecurity and Mobile Device Forensic
Issues relating to cybersecurity and its challenges in Nigeria can be traced as far back as the provision of Internet services to Nigerians in 1996. Nigerians are known for the huge frauds theyExpand
Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone
Perkembangan teknologi yang semakin pesat, dapat menimbulkan permasalahan bagi pengguna teknologi itu sendiri, semakin maju kehidupan masyarakat, maka kejahatan juga ikut semakin maju. SmartphoneExpand
Cybersecurity in Nigeria
  • A. Iorliam
  • Computer Science
  • SpringerBriefs in Cybersecurity
  • 2019
TLDR
It is observed that both the laws effectively detected whether a particular network was non-malicious or malicious by investigating its data using these laws, and the initial Benford’s law chisquare divergence values obtained seem to be inversely proportional to Zipf's law P-values, which can be potentially exploited for intrusion detection system applications. Expand
...
1
2
...

References

SHOWING 1-10 OF 47 REFERENCES
Mobile Forensics: overview of digital forensic, computer forensics vs. mobile forensics and tools
Now a days the growth of advanced life the mobiles and computers are very necessary components to be considered for the progress. The continued growth of the mobile device market, the possibility ofExpand
Smartphone Forensic Investigation Process Model
TLDR
The Smartphone forensic investigation process model (SPFIPM) has been developed with the aim of guiding the a effective way to investigate a Smartphone with more area of finding the potential evidence. Expand
Research of Digital Evidence Forensics Standard Operating Procedure with Comparison and Analysis Based on Smart Phone
  • Iven Lin, H. Chao, Shih-Hao Peng
  • Computer Science
  • 2011 International Conference on Broadband and Wireless Computing, Communication and Applications
  • 2011
TLDR
This research will discuss Smart-Phone Digital Evidence Forensics Standard Operating Procedure (Smart-Phone DEFSOP), compare with the SOP which was proposed by National Institute of Standards and Technology (NIST), and use trusted third party forensics tools to collect, analyze and examine digital evidences. Expand
Mapping Process of Digital Forensic Investigation Framework
Summary Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices andExpand
Harmonised digital forensic investigation process model
TLDR
The authors believe that the proposed model is comprehensive and that it harmonises existing state-of-the-art digital Forensic investigation process models and can lead to the standardisation of the digital forensic investigation process. Expand
An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines
TLDR
Comparison and contrast the current guidelines involved in the forensic examinations of mobile devices and hard disk drives are compared and identified areas of mobile device examinations where current guidelines are different and could be lacking strength and solidity. Expand
Handbook of Digital Forensics and Investigation
The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics andExpand
A Process Model for Forensic Analysis of Symbian Smart Phones
TLDR
A process model for forensic analysis of Symbian smartphone forensics can overcome some problems of the traditional model of digital investigation on Symbian smartphones. Expand
A New Approach of Digital Forensic Model for Digital Forensic Investigation
TLDR
This research aims at identifying activities that facilitate and improves digital forensic investigation process by reviewing existing digital forensic framework and producing a new model to improve the whole investigation process. Expand
The importance and the role of forensics of mobile
Scientific-technological development, along with initiating integrative forces that offer improvement of the quality of human life, concurrently created prerequisites for individuals to exploitExpand
...
1
2
3
4
5
...