Premium Essay

Nt1310 Unit 4.3 Project

Submitted By
Words 638
Pages 3
4.3 Project Value. It is not too difficult find information about mobile phones vulnerabilities and methods to data recovery, but on the contrary, it is complicated find information about data recovery using professional manners (digital forensic methods).

4.4 Project Interest. The methods and techniques that will be described in this project can be used as guide for digital forensic students, or can also be used to improve the knowledge of digital forensic professionals.

5. METHODOLOGY

The methodology used in this research will be divided in different phases, in order to offer a better perspective and understanding with respect to this research.
The list of devices used during the investigation is:

Nokia C5-00. It was chosen for this research …show more content…
Kernel Version: 3.0.31-2168382

iPhone 2. It was chosen this mobile phone because is one of the first iPhones on the market, and it was necessary to make a comparison of iOS features between an old device model and a new one.
Technical Characteristics:

iPhone 4. It was chosen because is relatively a new device, being iPhone one of the most popular mobile phones. Similarly to the iPhone 2, it was necessary to establish a comparison between 2 iOS devices.
Technical Characteristics: . Model: Apple iPhone 4S . Platform: iOS . Software version: 8.3

Phase 1. Data Gatheting. As a previous step to start this research, it was necessary to configure all devices with the factory settings; it means that not information will be available before the data acquisition.
Once the devices have been restored to the factory settings, it was be necessary to add contacts, make and receive phone calls, download and install new software, connect to different WIFI networks, and browse on internet; It was shared information with other users, deleted and modified data, connected to an e-mail server, and it was tried hide information (using specific memory partitions). Every device selected to this study has the “factory settings”

Similar Documents

Premium Essay

Test

...the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10

Premium Essay

Nt 1210

...and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18