There are several ways that could be followed according to the scenario,.So, the first step should be to isolate the mobile device from the network. It is possible that attackers could remotely wipe data or any new activity could override the existing data.For mobile forensics below steps are good practices to follow: ![]() If it is very important to maintain evidence integrity throughout the investigation. Preservation of evidence is a very crucial step in digital forensics.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |