Cyber Wars and Cyber Threats Against Mobile Devices: Analysis of Mobile Devices

Cyber Wars and Cyber Threats Against Mobile Devices: Analysis of Mobile Devices

Hamza Kayabaş, Gurkan Tuna
Copyright: © 2023 |Pages: 23
DOI: 10.4018/978-1-6684-6741-1.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In recent years, the electronic device that has been used and bought the most by the consumers is mobile devices. Recently, there has been a significant increase in cyber crimes committed using mobile devices. It has been seen that this situation has become more critical with the widespread use of mobile devices in society, and it is of great importance to take some precautions. Unlike traditional crimes, detecting and analyzing these types of crimes requires special and technical knowledge. The detection of crimes committed using mobile devices is possible with the evidence obtained in accordance with the procedure. Therefore, in this study, a forensic analysis process in which data in a mobile device has been accessed and extracted using UFED 4PC mobile forensic software, and the acquired data has been analyzed using cellebrite physical analyzer has been carried out. As the analysis shows, these software-based tools can be used to extract mobile device data and analyze mobile devices with different brands, models, and operating systems.
Chapter Preview
Top

Forensics

Forensic science aims to solve problems related to legal disputes and identify the real criminals. It is an interdisciplinary field that includes many professions and branches of science. The first real forensic science laboratory was established in 1932 by the FBI in the USA (Parasram, 2020). From the 1960s to the early 1980s, computers were an industrial device that performed specific tasks in the use of research centers, universities, government agencies, and companies. With the emergence of the IBM PC in the 1980s, the users of these computers were able to write program code and access operating systems and hardware. For this reason, computers began to be thought to be an important source of evidence in investigations (Pollitt, 2010). In addition, computers invented by Apple's co-founder Steve Wozniak and his friend Steve Jobs in 1976 also contributed to the acceleration of the personal computer age.

Computer forensics is a new branch of forensic science that started to work in this field as a result of the fact that the types of crimes that occurred in the electronic environment differ from the traditional types of crimes after the personal use of computers began to become widespread in the 1980s (Parasram, 2020).

Key Terms in this Chapter

Incident Response: The steps used to prepare for, detect, contain, and recover from a data breach.

Cyber Threat: A malicious act performed with the aim of damaging data, stealing data, or disrupting digital life in general.

Forensic Image: A bit-by-bit, sector-by-sector direct copy of a physical storage device.

Cyber Warfare: A set of actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks.

Complete Chapter List

Search this Book:
Reset