From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Collecting evidence from mobile and IoT devices

Collecting evidence from mobile and IoT devices

- Collecting evidence from mobile and IoT devices definitely is challenging nowadays for forensics investigation, right? Many mobile devices employ encryption methods that will protect user data, which is actually a good thing. Strong encryption can impede access to crucial evidence, requiring forensics experts to actually employ advanced techniques to actually bypass or crack encryption safeguards. An extremely controversial topic, and depending on where you reside, you may have a different privacy laws than where if you are a cybersecurity expert trying to do this type of evidence collection, it may be impossible for you to do in a personal device. Now, if the device is actually owned by the company, that may be a different story depending on the policies that you have in place and how those can be enforced in your local jurisdiction, right. Now the other challenge is the device diversity and fragmentation. A lot of these mobile devices and IoT devices have their own operating…

Contents