CFP last date
20 January 2025
Reseach Article

Mobile Forensics: Overview of Digital Forensic, Computer Forensics Vs Mobile Forensics and Tools

Published on May 2012 by Shubhangi Daware, V. M. Thakare
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 6
May 2012
Authors: Shubhangi Daware, V. M. Thakare
38bc3f9e-f0a8-42c6-93c0-c23e4198e20c

Shubhangi Daware, V. M. Thakare . Mobile Forensics: Overview of Digital Forensic, Computer Forensics Vs Mobile Forensics and Tools. National Conference on Recent Trends in Computing. NCRTC, 6 (May 2012), 32-35.

@article{
author = { Shubhangi Daware, V. M. Thakare },
title = { Mobile Forensics: Overview of Digital Forensic, Computer Forensics Vs Mobile Forensics and Tools },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 6 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 32-35 },
numpages = 4,
url = { /proceedings/ncrtc/number6/6559-1049/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Shubhangi Daware
%A V. M. Thakare
%T Mobile Forensics: Overview of Digital Forensic, Computer Forensics Vs Mobile Forensics and Tools
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 6
%P 32-35
%D 2012
%I International Journal of Computer Applications
Abstract

Now a days the growth of advanced life the mobiles and computers are very necessary components to be considered for the progress. The continued growth of the mobile device market, the possibility of their use in criminal activity will only continue to increase. The mobile device market provides many manufactures and models causing a strong diversity. Due to such features and facilities, people will more depend on application such as SMS, MMS, Internet Access, Online Transactions etc. There are many tools and techniques available to identify and investigate the crimes done with the help of mobiles or computers. So, it becomes difficult for a professional investigator to choose the proper forensics tools for seizing internal data from mobile devices. Such mobile device also provides a good source of evidence for forensic investigators to prove or disprove the commitment of crimes of victims. Through this paper, we will give an overview of digital forensic process and tools and also the comparison between computer and mobile forensics. Each popular digital forensic tool and offer an inside view for investigators to choose their free sources or commercial tools. Also we have focused on the area and applications of digital forensics.

References
  1. Digital forensic is applicable in the future Enterprise Resource Planning Systems.
  2. Recent development in digital image processing
  3. Accuracy enhancement in environment sound recognition using ZC features and MPEG-7 with modified K-NN classifier feature
  4. Digital forensic in VoIP Networks
  5. Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera
  6. An Analysis of the Digital Forensic Examination of Mobile Phones
  7. References
  8. G. Eason, B. Noble, and I. N. Sneddon, "On certain integrals of Lipschitz-Hankel type involving products of Bessel functions," Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)
  9. J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed. , vol. 2. Oxford: Clarendon, 1892, pp. 68–73.
  10. S. Jacobs and C. P. Bean, "Fine particles, thin films and exchange anisotropy," in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  11. K. Elissa, "Title of paper if known," unpublished.
  12. R. Nicole, "Title of paper with only first word capitalized," J. Name Stand. Abbrev. , in press.
  13. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, "Electron spectroscopy studies on magneto-optical media and plastic substrate interface," IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
  14. M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.
  15. Aljazeera (2005). Phone Dealers in al-Hariri Probe Net, URL,
  16. http://www. idc. com/getdoc. jsp?containerId=prUS21303808, 6. FoneKey (2008). URL, www. FoneKey. net, 7. Ducell (2008). URL, www. DuCell. org, 8. Mock,
  17. Computer Forensic Tool Testing Program, Computer Imaging Specification, Version 3. 1. 6, National Institute of Standards and Technology. Available at: www. cftt. nist. gov
  18. Eckert, W. G. , Introduction to Forensic Sciences, 1997, CRC Press.
  19. Federal Rules of Evidence, Article VII. Opinion and Expert Testimony, Rule 702 & Rule 703. Available at: www. house. gov/judiciary/evid00. pdf
  20. Foster, K. , R Huber, Judging Science: Scientific Knowledge and the Federal Courts, 1997, MIT Press.
  21. Koehler, J. J. , A. Chia, S. Lindsey, , "The Random Match Probability in DNA evidence: Irrelevant or Prejudicial," Jurimetrics Journal, 1995, Winter, pp. 201-219.
  22. Pollack J. , US District Court, PA: U. S. v Plaza, Acosta (Cr. No. 98-362-10, 11,12), "Strengthening the Criteria for Admissibility of Fingerprint Evidence," Judicial Opinion. Available at: www. paed. uscourts. gov/documents/opinions/02D0046P. htm
Index Terms

Computer Science
Information Sciences

Keywords

Forensic Digital Evidence investigation Process New Start Material