Culminating Project Title
Date of Award
Culminating Project Type
Information Assurance: M.S.
Information Assurance and Information Systems
Herberger School of Business
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.
Keywords and Subject Headings
iPhone Acquisition types, iPhone, iOS
Smartphones have become an essential commodity for people all around the world. Literally, almost every person in the world is migrating towards smartphones. It has become a trend because it has almost the same computing power as a computer and the major advantage is that it is portable. All the tasks a computer can do can be done by a smartphone and that is what people like about it.
The most popular smartphone in the world is the “Apple iPhone”. Because of its features and specifications many people in the world use it for various purposes. The iPhone is used by various groups of individuals such as students, faculty, business man, factory workers etc. Because of its large group of users, there might be chances that it can be used for false purposes too. So, there has been a rise in the new scope of the subject known as “iPhone forensics”. This involves analysis of the user’s data from backup such as retrieving messages, photos, keystrokes, notes, browser’s cache etc.
There have been several methods which used for retrieving the user’s data. All these applications were developed by several organizations worldwide. They can be either free versions which are open source or available to buy.
This paper briefly discusses all the aspects starting from what an iPhone is to how forensics can be done on an iPhone. It mainly deals with the methods of how data is retrieved using different forensic tools and how the retrieved data is analyzed. After performing various analysis, we see that the logical acquisition is much better than other approaches as it yields better results and we see it from our experiments performed.
Chinthapatla, Sandeep, "Comparison of Forensic Analysis Results Obtained by Various Types of Acquisitions" (2019). Culminating Projects in Information Assurance. 78.