Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

Investigating Mobile Forensics > The Components of a Mobile Device - Pg. 296

296 Chapter9·ForensicAnalysisofMobileMalware Introduction In this chapter, we will discuss the concept of conducting a forensic investigation on data that has been read, stored, or manipulated on some type of mobile device. In particular, we will focus on the techniques for investigating malicious code and its impact on a mobile device. Many of the attacks on mobiles are similar to that of the more traditional storage devices; however, some notable differences exist that we should be aware of while collecting potential evidence. Today's mobile devices (such as smartphones and personal digital assistants) are handheld computing devices that combine a multitude of functions and features including computing, telephony, faxing, and Web browsing. Additionally, the PDA or smartphone can, and most often, contain some form of networking or other form of connectivity capabilities. Mobile phone proliferation is on the increase, with more than 1.5 billion mobile phones sold to date ( Jansen 2005). These devices have reached such a level of power and functional- ity that they are in essence a mini-computer. As digital wallets and other credential stores add convenience to online transactions, enhancements in the connectivity of mobile devices and networks make these systems targets for attack. As mobile phones are more widely used to conduct transactions such as stock trading, online shopping, hotel reservations, mobile banking, and flight reservations and confirmations,