The Repository @ St. Cloud State

Open Access Knowledge and Scholarship

Date of Award

3-2019

Culminating Project Type

Starred Paper

Degree Name

Information Assurance: M.S.

Department

Information Assurance and Information Systems

College

Herberger School of Business

First Advisor

Mark Schmidt

Second Advisor

Lynn Collen

Third Advisor

Sneh Kalia

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Keywords and Subject Headings

iPhone Acquisition types, iPhone, iOS

Abstract

Smartphones have become an essential commodity for people all around the world. Literally, almost every person in the world is migrating towards smartphones. It has become a trend because it has almost the same computing power as a computer and the major advantage is that it is portable. All the tasks a computer can do can be done by a smartphone and that is what people like about it.

The most popular smartphone in the world is the “Apple iPhone”. Because of its features and specifications many people in the world use it for various purposes. The iPhone is used by various groups of individuals such as students, faculty, business man, factory workers etc. Because of its large group of users, there might be chances that it can be used for false purposes too. So, there has been a rise in the new scope of the subject known as “iPhone forensics”. This involves analysis of the user’s data from backup such as retrieving messages, photos, keystrokes, notes, browser’s cache etc.

There have been several methods which used for retrieving the user’s data. All these applications were developed by several organizations worldwide. They can be either free versions which are open source or available to buy.

This paper briefly discusses all the aspects starting from what an iPhone is to how forensics can be done on an iPhone. It mainly deals with the methods of how data is retrieved using different forensic tools and how the retrieved data is analyzed. After performing various analysis, we see that the logical acquisition is much better than other approaches as it yields better results and we see it from our experiments performed.

Share

COinS