Mobile Device Forensics, and IoT Forensics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/85

flashcard set

Earn XP

Description and Tags

Flashcards on Cyber Forensics, Incident Response, Mobile Device Forensics, and IoT Forensics

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

86 Terms

1
New cards

Mobile Device Forensics & IoT Forensics Overview

Operation of cellular network; Service provider meta-data

2
New cards

Mobile Phone Generations

Analog, Digital personal communications service (PCS), Third-generation (3G), Fourth-generation (4G), Fifth-generation (5G)

3
New cards

Fifth-generation (5G) cellular networks

Expected to be finalized in 2020, will incorporate emerging technologies

4
New cards

3G standard

Developed by the International Telecommunications Union (ITU) under the United Nations

5
New cards

3G standard Compatibility

Compatible with Code Division Multiple Access (CDMA), Global System for Mobile (GSM), and Time Division Multiple Access (TDMA)

6
New cards

4G network technologies

Orthogonal Frequency Division Multiplexing (OFDM), Mobile WiMAX, Ultra Mobile Broadband (UMB), Multiple Input Multiple Output (MIMO), Long Term Evolution (LTE)

7
New cards

Code Division Multiple Access (CDMA) networks

Follows IS-95 and is referred to as CDMAOne

8
New cards

Global System for Mobile Communications (GSM)

Uses the Time Division Multiple Access (TDMA) technique

9
New cards

Main components used for communication

Base transceiver station (BTS), Base station controller (BSC), Mobile switching center (MSC)

10
New cards

Mobile Phone Basics components

Home Location Register (HLR), Interworking Functions (IWF), Visitor Location Register (VLR), Mobile Switching Center (MSC), Equipment Identity Register (EIR), Operation and Maintenance Center (OMC), Short Message Service Center (SMSC)

11
New cards

Cell Network Information

Detailed information to enable cell handoff and for billing and usage purposes

12
New cards

Metadata Retention in Australia

Origin, destination and time of phone calls, text messages, and emails for at least two years

13
New cards

Items stored on cell phones

Incoming, outgoing, and missed calls; Multimedia Message Service (MMS; text messages) and Short Message Service (SMS) messages; E-mail accounts; Instant-messaging (IM) logs; Web pages; Pictures, video, and music files

14
New cards

Hardware components of Mobile Devices

Microprocessor, ROM, RAM, a digital signal processor, a radio module, a microphone and speaker, hardware interfaces, and an LCD display

15
New cards

Where phones store system data

Electronically erasable programmable read-only memory (EEPROM)

16
New cards

Peripheral memory cards used with PDAs

Compact Flash (CF), MultiMediaCard (MMC), Secure Digital (SD)

17
New cards

Subscriber identity module (SIM) cards

Consists of a microprocessor and internal memory

18
New cards

Main concerns with mobile devices

Loss of power, synchronization with cloud services, and remote wiping

19
New cards

Areas to Check in Forensics Lab

Internal memory, SIM card, Removable or external memory cards

20
New cards

Data Acquisition from Mobile: SIM contents

International Mobile Subscriber Identity (IMSI), Integrated Circuit Card Identifier (ICC-ID)

21
New cards

File system structure for a SIM card

Master File (MF), Dedicated File (DF), Elementary File (EF)

22
New cards

SIM Security

Always Access; Card Holder Verification1 (CHV1) –PIN1; Card Holder Verification2 (CHV2)-PIN2; Administrative; NeverAccess

23
New cards

General procedure for using SIM card readers

Remove the device’s back panel; Remove the battery; Remove the SIM card from holder; Insert the SIM card into the card reader

24
New cards

Mobile Forensic Tool classification

Manual extraction, Eclipse, Project-A-Phone; Logical extraction, Paraben’s Device Seizure, Susteen’s Data Pilot; Physical extraction( Hex Dumping) CeleBrite’s UFED Touch Ultimate, RIFFBox

25
New cards

Where can find the stored evidence in Mobile Forensic Data Acquisition

Call history, SMS, Address book, Documents, Calendar, Videos, Photos, Web browser history, Email, Deleted data, Maps, Social networking data

26
New cards

Using Mobile Forensics Tools Paraben Software

Paraben’s Device Seizure, Cellebrite UFED Forensic System, MOBILedit Forensic

27
New cards

Three options for data extraction in Cellebrite UFED Forensic System

Logical; File system; Physical

28
New cards

The main IOS operating modes

Normal mode (secure bootchain), Recovery mode, DCFU mode (Boot ROM)

29
New cards

Backup files in iTunes contain copy of

SMS, photos, calendar, music, call logs, configuration files, documents, keychains, network settings, cookies

30
New cards

Data base file systems for forensic investigations

Call history, SMS Messages, Address Book Contacts, Consolidated GPScache, Photo metadata, Notes ,Voicemail

31
New cards

Android Platform Architecture

Linux Kernel, Native C/C++Libraries, Android Runtime, Java API Framework, SystemApps

32
New cards

Android Security features

Secure Kernel, Application Sandbox, The permission model, Application signing, Security Enhanced Linux, Full Disk Encryption, Trusted Execution Environment

33
New cards

Main partitions on Android

/boot, /system, /data, /cache, /recovery, /misc, /sdcard

34
New cards

Android file systems for forensic investigations

Root file system (Rootfs), Sysfs, Devpts, Cgroup, Proc, Tmpfs

35
New cards

Few important apps locations for investigations

GoogleChrome, Gmail, WhatsApp, Skype

36
New cards

logical acquisition using Santoku Linux

Android Debug Bridge (adb),Android SDK

37
New cards

Internet of Things (IoT)

Evolution from Internet of Thing (IoT) to Internet of Everything (IoE) to Internet of Anything (IoA)

38
New cards

5G devices categories

enhanced Mobile Broadband (eMBB), Ultra-reliable and Low-latency Communications (uRLLC),massive Machine Type Communications (mMTC)

39
New cards

IoT Architecture layers

Application Layer, Middleware Layer, Internet Layer, Access Gateway Layer, Edge Technology Layer

40
New cards

Potential IoT vulnerabilities

No automatic security updates, Improper communications and encryption, Lack of secure storage and authentication

41
New cards

The IoT critical areas that the attackers could breach

Device firmware & mobile application, Device memory, Device physical interface & network services, Local data storage & Cloud web interface, Device web interface & network traffic

42
New cards

Other disruptive attacks in IoT

DoS, Jamming, Ransomware, Sybil, Man-in-the-Middle, Replay, Side channel, Rolling code, Remote access attacks

43
New cards

Standard forensic examination process can include

Evidence identification and collection; Preservation; Analysis; Presentation and reporting

44
New cards

Wearable IoT devices

Wearable IoT devices can connect to smartphones or network through Bluetooth, Wi-Fi, GPS and NFC

45
New cards

Important files to be checked in Forensic Examination of Android Wearable Image

Log files, database logs, media files, cache files, application files

46
New cards

What is Mobile Device Forensics & IoT Forensics?

The process of identifying, preserving, analyzing, and presenting digital evidence from mobile devices and IoT devices.

47
New cards

What is a cellular network?

A network that provides high-speed wireless communication services for mobile devices.

48
New cards

What is service provider metadata?

Metadata that includes information about the origin, destination, and timing of communications, used for billing and network management.

49
New cards

What are mobile phone generations?

The evolution of mobile phone technology from analog to digital and beyond, with each generation offering increased speed and capabilities.

50
New cards

What are the benefits of fifth-generation (5G) cellular networks?

Emerging technologies that will provide even faster and more reliable wireless communication, supporting new applications and services.

51
New cards

What is the 3G standard?

A standard developed to ensure compatibility and global roaming for mobile devices.

52
New cards

What are 4G network technologies?

The various technologies used in 4G networks to achieve higher data rates and improved network performance.

53
New cards

What are the main components used for communication?

The main components that facilitate communication in a cellular network.

54
New cards

What is cell network information?

The detailed information collected by cellular networks for cell handoff, billing, and usage tracking.

55
New cards

What is metadata retention in Australia?

A law in Australia that requires telecommunications companies to retain metadata for a specified period.

56
New cards

What items are stored on cell phones?

The various types of data stored on cell phones, including communications, media, and personal information.

57
New cards

What are the hardware components of mobile devices?

The physical components that make up a mobile device.

58
New cards

Where do phones store system data?

The type of memory where phones store system data.

59
New cards

What are the peripheral memory cards used with PDAs?

The different types of peripheral memory cards used with PDAs for data storage.

60
New cards

What are subscriber identity module (SIM) cards?

A card that contains a microprocessor and internal memory, used to identify and authenticate a mobile device on a network.

61
New cards

What are the main concerns with mobile devices?

The main issues encountered when dealing with mobile devices in a forensic context.

62
New cards

What areas should you check in a Forensics Lab?

The areas that need to be checked in a forensics lab to gather evidence from mobile devices.

63
New cards

What data is acquired from Mobile SIM contents?

Data extracted from a SIM card, including identifiers such as IMSI and ICC-ID.

64
New cards

What is the file system structure for a SIM card?

The structure of a SIM card's file system.

65
New cards

What are the SIM Security measures?

The mechanisms used to secure a SIM card and protect the data stored on it.

66
New cards

What is the general procedure for using SIM card readers?

The general steps to follow when using SIM card readers for data extraction.

67
New cards

What are mobile forensic tool classifications?

The different types of tools used in mobile forensics for data extraction.

68
New cards

Where can you find stored evidence in Mobile Forensic Data Acquisition?

The locations where evidence can be found in mobile forensic data acquisition.

69
New cards

What are some Mobile Forensics Tools Paraben Software offers?

Software tools used for mobile forensics, such as Paraben’s Device Seizure and Cellebrite UFED Forensic System.

70
New cards

What are the three options for data extraction in Cellebrite UFED Forensic System?

The three main methods for extracting data using Cellebrite UFED Forensic System.

71
New cards

What are the main IOS operating modes?

The different operating modes of iOS devices.

72
New cards

What does the backup files in iTunes contain a copy of?

The types of data included in iTunes backup files.

73
New cards

What are the data base file systems for forensic investigations?

The types of database file systems used for forensic investigations on mobile devices.

74
New cards

What is the Android Platform Architecture?

The architecture of the Android platform, including the Linux Kernel and Java API Framework.

75
New cards

What are Android Security features?

The security features implemented in Android to protect the operating system and user data.

76
New cards

What are the main partitions on Android?

The main partitions on an Android device, including /boot, /system, and /data.

77
New cards

What are the Android file systems for forensic investigations?

The file systems used in Android for forensic investigations.

78
New cards

What are a few important apps locations for investigations?

The locations of important apps on Android devices for forensic investigations.

79
New cards

How do you perform logical acquisition using Santoku Linux?

The use of Android Debug Bridge (adb) and Android SDK for logical acquisition using Santoku Linux.

80
New cards

What is the Internet of Things (IoT)?

The evolution of the Internet of Things (IoT) to the Internet of Everything (IoE) and the Internet of Anything (IoA).

81
New cards

What are the 5G devices categories?

The categories of 5G devices, including enhanced Mobile Broadband (eMBB) and Ultra-reliable and Low-latency Communications (uRLLC).

82
New cards

What are IoT Architecture layers?

The layers of the IoT architecture, including the Application Layer and Middleware Layer.

83
New cards

What are potential IoT vulnerabilities?

The potential vulnerabilities in IoT devices, such as lack of security updates and improper encryption.

84
New cards

What are the IoT critical areas that the attackers could breach?

The critical areas in IoT that attackers could breach, including device firmware and mobile applications.

85
New cards

What are other disruptive attacks in IoT?

Disruptive attacks in IoT, such as DoS, ransomware, and man-in-the-middle attacks.

86
New cards