Back to Search Start Over

Mechanism to Handle Mobile Devices in Cyber Security Investigations.

Authors :
Kumar, Abhishek
Senapati, Kishore Kumar
Patnaik, K. Sridhar
Source :
Grenze International Journal of Engineering & Technology (GIJET); 2023, Vol. 9 Issue 2, p524-529, 6p
Publication Year :
2023

Abstract

Smartphones play an extensive position withinside most company investigations into cyber intrusions. Investigations from the Law Enforcement additionally contain cellular gadgets sporting crucial proof that could assist carry the case to its logical conclusion. Smartphones are utilized in several crook justice contexts. The company presents mobile telephones to lots of its personnel as a part of their task duties, and the BOYD (carry your very own tool) idea is broadly adopted, permitting customers to get admission to workplace applications (like Outlook, Skype, etc.) the usage of their very own transportable gadgets. Based on forensic proof from research starting from conventional crimes (homicide, robbery, kidnapping, etc.) to technological crimes like cybersecurity incidents on company-huge cellular facilities, unlawful get admission to or exchanges, or facts theft, the cybercrime inquiry unit can be required to capture the cellular gadgets and ship them to FLS for added analysis. The chain of custody high-quality practices for securing mobile telephones, iPads, company cellular telephones, and BYOD gadgets in a manner that protects the integrity of the proof and is consequently suited in courtroom docket are in short defined on this paper. This paper's chain of custody technique was created especially for cellular platforms which require specific application of mind and use of tools in the reconstruction of the scene of crime as well as management of the evidence due to the variety of operating systems and nature of dynamic evidence which mobile devices have. The necessities of the commercial enterprise and regulation enforcement agencies that might use the record for normal cellular tool investigations in India have been taken into consideration while it was being developed. This paper has been written retaining in view the necessities of each enterprise in addition to the Law Enforcement Agencies to apply it for his or her everyday cybersecurity investigations concerning cellular gadgets. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
23955287
Volume :
9
Issue :
2
Database :
Complementary Index
Journal :
Grenze International Journal of Engineering & Technology (GIJET)
Publication Type :
Academic Journal
Accession number :
171360307