CATEGORY: SMAC & BYOD Forensics
25.4 – Digital Forensics Lifecycle
Digital Forensic lifecycle Digital forensics was developed in response to the rise of crimes committed by the use of computer systems either as a purpose of crime and device used to commit a crime or a depository of proof associated with a crime. Digital forensics can be traced back to as early as 1984 when […]
25.3 – BYOD Forensics
Introduction to BYOD Several years ago, it was common for companies to persist in issuing mobile devices to their employees in an office. Then came the explosion in Apple iPhone, and more and more people were depending on their own devices for working purposes. That brought about the fashion in bringing your own device (BYOD). […]
25.2 – Cloud Forensics
Challenges in Investigation In all circumstances that engage deployment models and cloud services, the cloud business model presents challenges on access to forensic data. For example, IaaS (infrastructure as a service) users may enjoy simple and effortless access to all data needed for a forensic investigation, but SaaS (software as a service) users won’t be […]
25.1 – Mobile Forensics
Introduction to Mobile OS Mobile phones are undergoing explosive growth. Today one can almost experience everything including banking, the internet, ecommerce, and credit card operations with mobile phones. Latest mobile phones take pride in their sophisticated mobile operating system software. A few decades ago, mobile phones were considered as non-optimal assets for capturing photos or […]
25.0 – Social Media Forensics
Social Media Social media sites like Twitter, Facebook and LinkedIn can be a treasure trove for forensics examinations. The expanding ocean of data in those networks is appealing to examiners. Marketers are already using social data to investigate links among customers. An establishment named 33Across looks at associations among social media customers to determine who, […]


