A Comprehensive Perspective on Mobile Forensics

Author(s):  
Aju D. ◽  
Anil Kumar Kakelli ◽  
Ashwin Suresh Varma ◽  
Kishore Rajendiran

The modern-day smartphones are the result of the technological progression that is happening in this digital world. This technological advancement has brought an incremental augmentation where these were not perceived as critical by the smartphone users. Also, the computational capability and networking competence has been dragooned constantly to maintain the momentum with the ever-expanding workload demands. This scenario has endorsed the smart gadgets such as smartphones and tablets to accomplish the growing complex challenges. In this digital era, the next generation users are substituting the conventional way of preference such as the personal computers and laptops with smartphone for the social connectedness, e-commerce, financial transaction, market updates, latest news, or even editing images. Users willingly install various mobile apps on to their smartphone and consequently providing their valuable and sensitive personal information to their service providers without thinking and knowing the security lapses and repercussions. Considering the fact, the smartphones' size and its portability, these devices are much more susceptible of being stolen, becoming jeopardized, or being exploited for various cyber-attacks and other malevolent activities. Essentially, the hackers look forward to the new mobile vulnerabilities so that they exploit the revealed vulnerability once a newer edition of the respective mobile operating system is released. In view of the fact that the smartphones are too vulnerable to various exploits, the necessity for a digital investigation entrained to establish a separate domain named mobile forensics. This established forensic domain is specialized in acquiring, extracting, analyzing, and reporting the evidence that is obtained from the smartphone devices so that the exploiting artifacts and its respective actions are determined and located. This chapter puts forward the various processes involved with the mobile forensics that can be employed for examining the evidences of various cyber incidents. Furthermore, it discusses the various vulnerabilities with the iOS and Android mobile operating systems and how they are being exploited in detail. The chapter also discusses the various approaches of data extraction and the respective industry standard for the tools that are being utilized for the same.

2019 ◽  
Vol 12 (2) ◽  
pp. 50-56
Author(s):  
A. Saravanan ◽  
S. Sathya Bama

Cyber attacks have become quite common in this internet era. The cybercrimes are getting increased every year and the intensity of damage is also increasing. providing security against cyber-attacks becomes the most significant in this digital world. However, ensuring cyber security is an extremely intricate task as requires domain knowledge about the attacks and capability of analysing the possibility of threats. The main challenge of cybersecurity is the evolving nature of the attacks. This paper presents the significance of cyber security along with the various risks that are in the current digital era. The analysis made for cyber-attacks and their statistics shows the intensity of the attacks. Various cybersecurity threats are presented along with the machine learning algorithms that can be applied to cyber attacks detection. The need for the fifth generation cybersecurity architecture is discussed.


Author(s):  
Irmawan Rahyadi

This article explores and mobilises the concept of ‘internet politics’ as an analytical entry point for understanding how politics emerge in the digital media world targeted to the public conversation and constituents believe to promote engagement and participation. Understanding political communication to public in digital platform is strategic in a digital era where exposure to political message is inevitable. Some leading academic databases are searched within a methodology of literature review to report a review of studies on internet politics. The result shows that research in this area incline towards utilization of a specifc platform in digital world. We conclude that political communication in the digital world started in the west and followed by non-western researcher. Technological advancement makes possible for people to communicate and gather virtually as in social media platform, thus any digital platform accessible for a substantial number of people is a potential channel for political communication where further research in this area needs to be directed.


2018 ◽  
Vol 7 (12) ◽  
pp. 24430-24432
Author(s):  
Ravi Kumar ◽  
Parvesh Kumar Chaudhary

Cyberattacks, ever increasing in severity, complexity and frequency are impacting the functioning of citizens, government, and businesses around the world. Protecting valuable intellectual property, business and personal information in digital form against theft, misuse, is an increasingly critical concern for everyone in the present digital era. The financial and reputational loss incurred due to Cyber-attacks motivate organizations to improve defensive measures to protect their organizational networks and information stored. This paper proposes an Cyber threat Intelligence (CTI) collection, log analysis and automated Threat alerting platform capable to analyze and respond to incidents that can lead to cyberattacks. The proposed system makes use of CTI received from Open Source intelligence (OSINT), Elasticsearch and Logstash to analyze, observe and generate alerts for malicious traffic/ activity in organization based on log analysis. At the same time an easy to understand visual representation can be made by the use using Kibana.


2021 ◽  
Vol 11 (7) ◽  
pp. 356
Author(s):  
Jacinto Jardim

For most professionals to succeed in the current job market, they need some entrepreneurial skills (ES). This study aimed to describe and systematize these skills, considering the current globalization and digital transformation phenomena. The documental analysis and the critical reflection on the collected data allowed us to identify the socio-economic and socio-cultural reasons for the relevance of this problem. Consequently, to elaborate a frame of reference intended to be adequate to the needs of the professionals of the current global and digital era. The results pointed to a tripartite ES model—to be open to novelty, to create solutions to emerging problems, and to communicate effectively—which integrates the following skills: Creativity and innovation, the spirit of initiative, self-efficacy and resilience, strategic planning, and evaluation, resolution of problems and decision-making, transformational leadership, clear and visual communication, teamwork and networking, and digital communication. In the continuation of this study, an ES scale will be created and validated according to this model, which will make it possible to measure the degree of development of these competencies.


2021 ◽  
Vol 26 (4) ◽  
Author(s):  
Jordan Samhi ◽  
Kevin Allix ◽  
Tegawendé F. Bissyandé ◽  
Jacques Klein

AbstractDue to the convenience of access-on-demand to information and business solutions, mobile apps have become an important asset in the digital world. In the context of the COVID-19 pandemic, app developers have joined the response effort in various ways by releasing apps that target different user bases (e.g., all citizens or journalists), offer different services (e.g., location tracking or diagnostic-aid), provide generic or specialized information, etc. While many apps have raised some concerns by spreading misinformation or even malware, the literature does not yet provide a clear landscape of the different apps that were developed. In this study, we focus on the Android ecosystem and investigate Covid-related Android apps. In a best-effort scenario, we attempt to systematically identify all relevant apps and study their characteristics with the objective to provide a first taxonomy of Covid-related apps, broadening the relevance beyond the implementation of contact tracing. Overall, our study yields a number of empirical insights that contribute to enlarge the knowledge on Covid-related apps: (1) Developer communities contributed rapidly to the COVID-19, with dedicated apps released as early as January 2020; (2) Covid-related apps deliver digital tools to users (e.g., health diaries), serve to broadcast information to users (e.g., spread statistics), and collect data from users (e.g., for tracing); (3) Covid-related apps are less complex than standard apps; (4) they generally do not seem to leak sensitive data; (5) in the majority of cases, Covid-related apps are released by entities with past experience on the market, mostly official government entities or public health organizations.


Author(s):  
Samyak Sadanand Shravasti

Abstract: Phishing occurs when people's personal information is stolen via email, phone, or text communications. In Smishing Short Message Service (SMS) is used for cyber-attacks, Smishing is a type of theft of sensitive information. People are more likely to give personal information such as account details and passwords when they receive SMS messages. This data could be used to steal money or personal information from a person or a company. As a result, Smishing is a critical issue to consider. The proposed model uses an Artificial Intelligence to detect smishing. Analysing a SMS and successfully detecting Smishing is possible. Finally, we evaluate and analyse our proposed model to show its efficacy. Keywords: Phishing, Smishing, Artificial Intelligence, LSTM, RNN


Koneksi ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. 328
Author(s):  
Jovita Clarissa ◽  
H.H. Daniel Tamburian

Humans are social beings who need other individuals to group. In interacting with others, individuals will convey information and usually begin with an introduction relates to self disclosure, which is the type of individual communication disclosing information about himself is commonly concealed. Social media is a medium on the Internet that allows users to represent themselves, share, communicate with others and create virtual social ties. This research was intended to examine Instagram and Self Disclosure in an interpersonal communication perspective on the Santo Kristoforus II high school students to find out the activities of students on Instagram social media. Research based on Self-Disclosure theory, communication theory in the Digital Era, social media, and Instagram. Research uses a qualitative approach with case study methods. The results is that the self disclosure conducted by the informant is about daily activities, and the self disclosure is on Instagram involving several Self-Disclosure processes. In the process of Self-Disclosure, informants usually provide personal information such as feelings, thoughts and experiences, and they are also careful enough in uploading information to social mediaManusia disebut makhluk yang memerlukan seseorang untuk saling berhubungan timbal balik. Dalam berinteraksi dengan orang lain, individu akan menyampaikan berbagai informasi dan biasanya diawali dengan perkenalan mengenai dirinya, hal tersebut berkaitan dengan self disclosure, yakni jenis komunikasi individu mengungkapkan informasi tentang dirinya sendiri yang biasa disembunyikan. Media sosial saat ini digunakan penggunanya untuk berkomunikasi, membentuk relasi dengan orang lain secara virtual. Sehingga penelitian ini dimaksudkan untuk meneliti Instagram dan Self Disclosure dalam Perspektif Komunikasi Antarpribadi terhadap Siswa-Siswi SMA Santo Kristoforus II untuk mengetahui aktivitas siswa-siswi di media sosial Instagram. Penelitian berlandaskan teori Self-Disclosure, Teori Komunikasi di Era Digital, Media Sosial, dan Instagram. Penelitian menggunakan pendekatan kualitatif dengan metode studi kasus. Hasil penelitian menunjukkan bahwa pengungkapan diri yang dilakukan oleh informan berisi tentang aktivitas sehari-hari yang dilakukan, dan pengungkapan diri tersebut dilakukan dalam media sosial Instagram yang melibatkan beberapa proses pengungkapan diri. Dalam proses pengungkapan diri, informan biasanya memberikan informasi pribadi seperti perasaan, pikiran dan pengalaman. Dengan banyaknya informasi yang diberikan, tidak menutup kemungkinan mereka juga cukup berhati-hati dalam mengunggah informasi ke media sosial


We live in a digital world or digital era. Hence, People will argue that not only do information communication technologies (ICTs) make e-health possible but rather that it is an innovation advance whose time has come. Notwithstanding, e-health while hoping to create well needed improvement in health care, it is rife with certain challenges which are not limited to e-health literacy. However, this paper looks specifically at e-health literacy. The paper, in particular overviews e-health while addressing the impacts of key contextual factors that impacts e-health and e-health literacy regarding the propensity to adopt and use e-health in LEDCs.


The current digital era is full of digital devices and to ensure the safety of their data, users utilize the protective armor of passwords using the fingerprints lock, face lock, pin codes and password locks. The trial-and-error method possesses an infinite possibility of passwords in patterns/ pin locks for unlocking the devices. The levels of security ensure that only a limited number of trials are possible before any device blocks itself or makes unlocking harder. In these circumstances, especially when a victim is a deceased person (e. g. an abetment in suicide case), the password is practically impossible to attain through the authorities. However, the data can be retrieved with the unique and distinctive method of Chip-off analysis. In this study, a password protected mobile phone was retrieved from a deceased individual and only the analysis of his/her mobile could lead to investigative insights for catching the perpetrator. The Chip-off method has several difficulties and a password/ pin protected device increases the difficulties for analysis several folds. This study highlights the significance of chip-off analysis in achieving accurate importing and extraction of maximum data along with the use of the hardware/software, MSAB, XRY and other software.


Author(s):  
Joseph M. Woodside

The future of education lays in the hand of Cloud Computing given the benefits of learning delivery, costs reduction, and innovation. At the same time, the threat of cyber-attacks and security breaches are also mounting for education based organizations and are a prime target given the amount and type of personal information available. This manuscript discusses the cloud security, privacy, and ethical mechanisms required from a teacher, student, and administrator perspective.


Sign in / Sign up

Export Citation Format

Share Document