Tuesday, May 28, 2019

iPhone Security Essay -- Mobile Technology, Computer Forensics

iPhone SecurityNowadays, technology is speeding our way of communication and the way in which we travelling bag our personal lives. Zdziarski (2008) described, How the iPhone has quickly become a market leader in technology and has been a big success around the world (preface.iX). The iPhone has become a very useful tool in many aspects of people lives. However, people should be aw ar that this device can store a great sum total of data in its memory and that if you ever lost or had it stolen all off your personal and professional information can be available to whoever has it in their hand. Today many companies do their business directly from the iPhones. Business people and non-business people alike are using the iPhone in order to achieve about of their office work or maintain contact with their family and friends. For example, in the commercial sectors most employees nowadays execute many of their tasks from anywhere and not necessarily throw away to go to their office and lo gin into their computers. By using the iPhone employees can create important documents, save important announcements and do important transactions by using the iPhone. On the different hand, people who are not in the business sectors use the iPhone for their personal use. For example, talk with their family, friends, or spend time doing web searching in different areas that they are interested in. Nevertheless, the iPhone contains sensitive information in their memory that belongs to the owner and information that can belong to other people with who the owner of the iPhone had realised a conversation or any type of chat in the network. Zdziarski (2008) described, that the information saved in the iPhone memory can be e-mails, photos, documents, text messages, phone... ...iminals are getting benefits from the iPhone. Engdahl (2011) described how the police and forensic investigators have to work together in order to find all the complete evidence that the criminals left in the iP hone before they committed their crime (p. 15). With the techniques, the skills, and knowledge of law enforcement officers and forensic investigators they allow be able to confidently prosecute those criminals involved in fraud, bribery and other corrupt practices and criminal acts. Judges and prosecutors have to have all the evidence before they condemn any person to jail. The job of law enforcement and computer forensics will never end because the criminals are using new tools to commit their crime. In fact, the job of law enforcement and forensic is to reveal the hiding information of the criminals who commits crimes to those who are indigent people.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.