Writing Question

User Generated



ITS 835

University of the Cumberlands



Subject - Enterprise Risk Management (ITS-835-A02) - First Bi-term

Week 6 Research Paper

After reading the required articles this week, please write a research paper that answers the following questions: 

What are mobile forensics and do you believe that they are different from computer forensics?

What is the percentage of attacks on networks that come from mobile devices?

What are challenges to mobile forensics?

  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Explanation & Answer:
4 pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.


Mobile forensics

Student’s name


What are mobile forensics and do you believe that they are different from computer
Being a subtype of digital forensics, mobile forensic deals with retrieving data from
electronic sources such as the recovery of evidence from tablets and smartphones. Mobile
devices hold a significant quantity of evidence which can be crucial to investigators since they
are used in sending, receiving, and searching data. Mobile stores a lot of info such as text
messages, location data, phone records, as well as online search history. Mobile forensics is used
by the military in gathering intelligence when they plan for military operations, especially on
terrorist attacks. Law enforcers also use mobile forensics to gather evidence in cases such as
homicide and identity theft among other types of crime (Barmpatsalou, Cruz, Monteiro, &
Simoes, 2018). Corporations also use mobile forensics in case they suspect employees are
committing fraud or fear that their intellectual property is being stolen. Employees are also
tracked by their employers to oversee how they use business devices in order to uncover illegal
The process of mobile forensics involves seizure and isolation, identification, acquisition,
examination analysis, and reporting. In Seizure and allocation evidence should be kept
adequately, analyzed, as well as accepted in a court. They are a slew of legal difficulties that
follow mobile device seizures and the process faces risks such as network connectivity and lock
activation. The purpose of identification is to retrieve information from the mobile phone by
opening g the locked screen with the use o...

Great content here. Definitely a returning customer.


Similar Content

Related Tags