.

Saturday, March 16, 2019

iPhone Security Essay -- Mobile Technology, Computer Forensics

iPhone SecurityNowadays, technology is speeding our representation of communication and the way in which we handle our personal lives. Zdziarski (2008) described, How the iPhone has quickly become a market place leader in technology and has been a big success round the world (preface.iX). The iPhone has become a very useful tool in some aspects of people lives. However, people should be awargon that this device heap store a great amount of data in its stock and that if you ever lost or had it stolen all off your personal and master nurture can be avail able-bodied to whoever has it in their hand. Today m either companies do their pedigree directly from the iPhones. Business people and non-business people alike are victimisation the iPhone in order to achieve some of their site work or maintain contact with their family and friends. For example, in the commercial sectors most employees nowadays execute many of their tasks from anywhere and not necessarily halt to go to th eir office and login into their computers. By using the iPhone employees can create grievous documents, save important announcements and do important transactions by using the iPhone. On the another(prenominal) hand, people who are not in the business sectors use the iPhone for their personal use. For example, talk with their family, friends, or spend time doing meshing searching in different areas that they are interested in. Nevertheless, the iPhone contains sensitive information in their remembrance that belongs to the owner and information that can belong to other people with who the owner of the iPhone had established a conversation or any type of chat in the network. Zdziarski (2008) described, that the information saved in the iPhone memory can be e-mails, photos, documents, text messages, phone... ...iminals are getting benefits from the iPhone. Engdahl (2011) described how the legal philosophy and forensic investigators have to work together in order to relegate all the complete evidence that the criminals left in the iPhone before they committed their crime (p. 15). With the techniques, the skills, and knowledge of law enforcement officers and forensic investigators they will be able to confidently prosecute those criminals involved in fraud, bribery and other round-shouldered practices and criminal acts. Judges and prosecutors have to have all the evidence before they condemn any person to jail. The job of law enforcement and computer forensics will never end because the criminals are using new tools to commit their crime. In fact, the job of law enforcement and forensic is to reveal the hiding information of the criminals who commits crimes to those who are innocent people.

No comments:

Post a Comment