Computer Science
Milan Institute Visalia Policy Drafting on Amazon Echo Paper

Milan Institute Visalia

Question Description

I need support with this Computer Science question so I can learn better.

Question1

  • Write a 10-12 page research paper on the topic Mobile device forensics, paper must include:

challenges of Mobile Forensics

legal restrictions/jurisdiction and myriad mobile devices.

current challenges facing the field of digital forensic

include tools and technologies designed to meet these issues

challenges posed by international jurisdiction

third party apps and services, mobile platforms and manufacturers

Cloud Computing.

Question 2

Write a 11-12 page on policy drafting on Amazon echo, paper should include:

Description of Amazon echo for home & business

Benefit and challenges of Amazon echo at home & business

Policy on data collection, sharing and limitation

Conclusion

Reference and citation

Clarify/style (how well you communicated your ideas in writing (the use of figures,pictures and table are all encouraged)

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Mobile Device Forensics

1

Mobile Device Forensics
Insert name of school
Insert your name
Insert professor name
March 2020

Mobile Device Forensics

2
Table of Contents

1

MOBILE DEVICE FORENSICS ........................................................................................................................... 3

2

CHALLENGES OF MOBILE FORENSICS ............................................................................................................. 3
2.1
2.2
2.3
2.4

OPERATING SYSTEMS AND MANUFACTURERS ..........................................................................................................3
CONNECTION ISSUES ..........................................................................................................................................4
LOGICAL VS. PHYSICAL........................................................................................................................................4
SOFTWARE ASSESSMENT .....................................................................................................................................5

3

LEGAL RESTRICTIONS/JURISDICTION AND MYRIAD MOBILE DEVICES ............................................................ 6

4

CURRENT CHALLENGES FACING THE FIELD OF DIGITAL FORENSIC .................................................................. 7

5

TOOLS AND TECHNOLOGIES DESIGNED TO MEET THESE ISSUES .................................................................... 8
5.1
5.2
5.3
5.4
5.5
5.6

APPLYING COMPLEMENTARY CUTTING EDGE RESEARCH TO FORENSICS........................................................................8
DISTRIBUTED PROCESSING ..................................................................................................................................9
HPC AND PARALLEL PROCESSING .........................................................................................................................9
GPU-POWERED MULTI- THREADING ....................................................................................................................9
DFAAS ..........................................................................................................................................................10
FIELD-PROGRAMMABLE GATE ARRAYS ................................................................................................................10

6

CHALLENGES POSED BY INTERNATIONAL JURISDICTION.............................................................................. 11

7

THIRD PARTY APPS AND SERVICES, MOBILE PLATFORMS AND MANUFACTURERS ...................................... 12

8

CLOUD COMPUTING .................................................................................................................................... 14

9

CONCLUSION ............................................................................................................................................... 15

10

REFERENCES ................................................................................................................................................ 16

Mobile Device Forensics

3

1

Mobile Device Forensics

Mobile forensics is described as "the process of recovering digital evidence from mobile devices
under robust forensic conditions and using acceptable methods. Mobile devices differ in
appearance and manufacturer. With the advancement of existing technologies and the
introduction of new technologies, they are constantly developing. It is important for researchers
to understand the working elements of a mobile device and the appropriate tasks to be performed
during its operation. Knowing the different types of mobile devices and their capabilities is an
important aspect of gathering information about the case, as usage records and other important
data may be available through the mailbox (Ayers, R., Brothers, S. and Jansen, W. (2013).
2

Challenges of Mobile Forensics

Thanks to scalable features, mobile technology has become the cornerstone of the information
age. They have a compact structure, strong mobility, high performance, and large storage space,
which can be easily transmitted and shared. This compact form of computing environment
presents challenges for mobile forensics, including technology, methods, training of inspectors,
and related costs associated with the development and maintenance of mobile forensics
capabilities (Vincze, Eva. (2016).
2.1

Operating systems and manufacturers

The market share of end-user desktop systems is divided into three major providers: MS
Windows, OSX from Apple Inc. and variants of the Linux operating system. The opposite is true
for mobile device operating systems. A new front-line phone is created every year, and leaders
from the previous year can easily and quickly lose their jobs. Although all operating systems
provide (roughly) the same features and options, they are very different in how they store data

Mobile Device Forensics

4

and access, security, and other settings and features. For example, Microsoft makes two
operating systems: Windows Mobile and Windows Phone. The two operating systems can even
be classified separately. Both operating systems are the work of one programmer, and the
Windows Phone operating system is actually the successor to the first programmer, but that ends
the similarity (Vincze, Eva. (2016).
2.2

Connection issues

To connect a phone, an expert must choose the right model from a long list of thousands of
names. The best smart software tools can make the life of an expert easier and determine the type
of plug model. But it can only be used with USB connections (though most popular). It should be
noted that most popular forensic tools can only be run on the Windows operating system, in
which case the impact is mitigated by the need to install the appropriate USB driver before
connecting the phone. Finding the right driver can be a real headache because experts can pick
up the phone without a CD case. Visiting the manufacturer's website is not always a solution,
especially if the phone model has been removed from production. Connecting with mobile
devices made by Apple, Nokia or Motorola is not difficult. In most cases, only one driver needs
to be installed to work with all phones made by the company.
2.3

Logical vs. Physical

Currently, data mining is generally classified according to two methods: physical method and
logical method. Physical methods perform low-level data extraction (usually using special
equipment). The logical approach uses higher-level communication protocols provided by the
phone. The advantages and disadvantages of each method are very clear. The physical method
allows you to get the contents of the entire phone memory without changes. However, this

Mobile Device Forensics

5

usually takes time and requires complex and expensive equipment. As a result, you will get
"raw" images that are encrypted in most cases. Even if someone has the opportunity to decrypt
the image (for example, no one can use BlackBerry for decryption), you can only use a special
complex software tool for more detailed analysis.
2.4

Software assessment

There are several software and hardware solutions on the market today for extracting and
analyzing data from mobile devices. Many of them combine physical and logical methods to
read data. The obvious question is: which one should you use? Unfortunately, analyzing the
product descriptions on the developer's website does not give a clear picture of the software's
capabilities. First of all, there is a misunderstanding of terminology; considering the different
forms of extracting data from the same model and the same model of different brands,
"supporting more than 7,000 profiles" actually means supporting 3,000 models. Second,
declaring support for some manufacturers' products does not imply support for all of their
models. Generally, instead of providing a detailed description of what the device can read, each
model is provided for all models. Researchers should keep in mind that support for specific
functions can be implemented at all levels. For example, MMS messages can only be read as
container files. Experts must then find and decode them. (You should know the file system
details of the model, and there are several popular proprietary MMS encoding formats.) (Vincze,
Eva. (2016).
In addition to issues related to the purity of forensic examinations, inspectors also face
absolute technical issues, including the manufacturer's identification and the operating system of
a particular phone. The wide variety of modern mobile phones makes this a real challenge. When
choosing software for surveys, it is important not only to have a complete understanding of the

Mobile Device Forensics

6

data that is usually not available on the device, but also to understand the amount of data that can
be downloaded and processed by specific software.
3

Legal restrictions/jurisdiction and myriad mobile devices

By its very nature, law enforcement is an information-rich activity. Law enforcement
information activities can be divided into three categories: collection and analysis of information
to determine that the law has been violated; collection and analysis of information to determine
the identity of the person responsible for the violation of the law; and collection and analysis of
information for legal certification in court The identity person did commit the crime of tort. All
of these collection and analysis activities have fundamentally changed as a result of the
advancement in the technology available to collect, store, and process data. Today, for example,
the use of cameras is common. Previously, they only occurred in highly secure environments,
and now they are implemented in many parks and schools in most shops, highways, and public
places. As a result, many people, especially in large cities, are subject to registration surveillance
far from home.
Law enforcement officials, and even most members of the public, believe that cameras
provide the opportunity to record video of any crime committed in public places where the
camera is used to support police investigations. Such a register has both investigative value (to
identify perpetrators) and deterrent value (to prevent potential o...

NKURUMAH (5667)
Boston College

Anonymous
Top quality work from this tutor! I’ll be back!

Anonymous
It’s my second time using SP and the work has been great back to back :) The one and only resource on the Interwebs for the work that needs to be done!

Anonymous
Thanks, good work

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4