This book is intended for individuals who are interested in the iPhone and other
iOS devices and, more importantly, in the type of data that is stored and can be
recovered from these devices. The demand for mobile forensics has grown tremendously
with the release of smart phones. Communication on these devices is now
documented because people are no longer using their phones for just talking.
Whether people use their iOS devices to send text messages, check their personal
and work e-mail, browse the Internet, manage their finances, or even take photos
and videos, what they do not realize is that this data is being stored on their
devices. When they delete a piece of information, it is expected that data is gone
forever. This book not only explains why this data can still be recovered but also
provides detailed methods on how a forensic examiner can extract this information
from an iOS device.
The book is organized in a manner that allows the reader to independently focus
on one chapter at a time. If a Corporate Security Officer is only interested in whether
the data stored on an iPhone or iPad is secure, he or she can jump straight to
Chapter 4 – iPhone Data Security. If an experienced mobile forensic examiner understands
all the files stored within the iPhone’s file system but is interested in learning
more about some advanced analysis techniques, he or she can skip through the first
few chapters and focus on Chapter 6 – Data and Application Analysis.
As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.
Learn techniques to forensically acquire the iPhone, iPad and other iOS devices
Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers
In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system