46,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

The fast-growing nature of instant messaging applications usage on android mobile devices brought about a proportional increase in the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store a significant amount of information in their various memory partitions such as sd card, RAM, NAND, and user data respectively when IM applications such as WhatsApp, Skype, Facebook, and Tango are executed on them. The research analyses Instant messaging applications on emulated Android devices using different forensics techniques. Deleted communication chats among the…mehr

Produktbeschreibung
The fast-growing nature of instant messaging applications usage on android mobile devices brought about a proportional increase in the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store a significant amount of information in their various memory partitions such as sd card, RAM, NAND, and user data respectively when IM applications such as WhatsApp, Skype, Facebook, and Tango are executed on them. The research analyses Instant messaging applications on emulated Android devices using different forensics techniques. Deleted communication chats among the emulated devices were retrieved from their database sources such as userdata-qemu.img, userdata.img, sdcard.img, among others. The research findings revealed that instant messaging applications leave data as potential digital evidence on emulated Android devices even when the chat is deleted.
Autorenporträt
Ashawa, MosesMoses Ashawa received the B.Sc. (Hon) in computer Science from Benue State University Makurdi, M.Sc. in Computer Security and Digital Forensics (Distinction) from the University of Bedfordshire, He works as a System Analyst at the Federal Ministry of Communication and Technology. He is currently a final year PhD at Cranfield University