Description
Please review the detailed Paper Instructions word doc that I have included. Please be sure to incorporate in text citations as needed, the more the better.
Please be sure to Include the following five sections on the final paper:
1. Overview of mobile technology, including network operations and mobile technologies
2. Description of trends in mobile technology, including handset transmission types and embedded device forensics, as well as operating systems, applications, and challenges and threats to forensic investigations
3. Laws, regulations, and considerations for the forensic handling of mobile devices
4. Analysis and presentation of forensic information including file system analysis, techniques for working through security measures, third-party applications, and other forms of mobile data analysis
5. Personal perspective on the greatest biggest threat and greatest opportunity/most promising technology in mobile forensics, based on readings, as well as other citable information.
Step 1: Conduct a Mobile Technology Overview
You’re ready to begin writing the white paper. The sheriff has stated that the first section should be an overview of how cellular networks operate. You decide to provide an overview of cellular networks: how mobile phones communicate with cell sites, cellular-to-cellular communication, mobile switching centers, and the base switching subsystem. You also want to cover the technology of mobile networks, including form factors of smart devices and other wireless technologies.
Step 2: Describe Trends in Mobile Technology
With the overview drafted, you now need to describe trends in mobile technology. For this step, you will address handset transmission types, mobile operating systems, challenges with mobile technology, and mobile device threats. The “trends” section would not be complete without addressing the latest in embedded device forensics.
Step 3: Discuss Laws, Regulations, and the Forensic Handling of Mobile Devices
After detailing trends in mobile technology, your next step is to discuss laws and regulations governing the search and seizure of mobile devices under the Fourth Amendment to the US Constitution, including describing the mobile device forensics process, considerations for effectively handling mobile devices during an investigation, use of proper investigative techniques, types of mobile forensics tools available, and identifying where digital forensics evidence may be found on mobile devices.
Step 4: Describe How to Analyze and Present Forensic Information
You have discussed your research on laws, regulations, and forensic handling. You are now ready to create the fourth section of the white paper, where you describe the analysis and presentation of forensic information.
Step 5: List the Biggest Threat and Most Promising Technology
In the previous four steps, you have reported on a variety of topics relating to mobile forensics. You have read and reported on technologies, trends, laws, and regulations, handling, and analysis of mobile data. For the final section of your paper, the sheriff has asked for your perspective on the biggest threat posed by cyber criminals using mobile technology, and a technology that promises a solution.
Reflect on your readings, to respond to the Sheriffs questions. There are no right or wrong answers, but you should provide references for your observations. You will be attaching this one-page section to the white paper.