Tuesday, May 28, 2019

iPhone Security Essay -- Mobile Technology, Computer Forensics

iPhone SecurityNowadays, technology is speeding our way of communication and the way in which we handle our personal lives. Zdziarski (2008) described, How the iPhone has quickly become a grocery leader in technology and has been a big success around the world (preface.iX). The iPhone has become a very useful tool in more aspects of people lives. However, people should be aware that this device tummy store a great amount of data in its memory and that if you ever at sea or had it stolen all off your personal and professional cultivation can be available to whoever has it in their hand. Today many companies do their business straight from the iPhones. Business people and non-business people alike are using the iPhone in order to achieve most of their office work or maintain trace with their family and friends. For example, in the commercial sectors most employees nowadays execute many of their tasks from anywhere and not necessarily consent to go to their office and login into their computers. By using the iPhone employees can create important documents, save important announcements and do important transactions by using the iPhone. On the other hand, people who are not in the business sectors use the iPhone for their personal use. For example, talk with their family, friends, or spend time doing web searching in different areas that they are interested in. Nevertheless, the iPhone contains sensitive information in their memory that belongs to the owner and information that can belong to other people with who the owner of the iPhone had established a conversation or any geek of chat in the network. Zdziarski (2008) described, that the information saved in the iPhone memory can be e-mails, photos, documents, text messages, phone... ...iminals are getting benefits from the iPhone. Engdahl (2011) described how the police and forensic investigators stool to work together in order to find all the complete evidence that the criminals left in the iPhone bef ore they committed their crime (p. 15). With the techniques, the skills, and knowledge of right enforcement officers and forensic investigators they will be able to confidently prosecute those criminals involved in fraud, bribery and other corrupt practices and criminal acts. Judges and prosecutors have to have all the evidence before they condemn any person to jail. The job of law enforcement and computer forensics will never end because the criminals are using sensitive tools to commit their crime. In fact, the job of law enforcement and forensic is to reveal the hiding information of the criminals who commits crimes to those who are innocent people.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.