Pin, Gesture And Password Analysis

Great Essays
4.5.4 Pin, Gesture and Password. Similarly to iOS, Android supports a four digits long (from 0 to 4) to gain access to the system. Android gives the opportunity to use a password of variable length, and is able to include numbers, symbols, and letters. Gesture is a pattern between symbols given; It is necessary to repeat the same gesture previously saved to gain access to the system. (Abalenkovs et al. 2012).
The use of the PIN access is probably the most extended method to protect the phone from unauthorized access, but it can be used to protect access to the filesystem. It is commonly provided by the manufacturer, and includes the possibility of change if the user wants. As security feature, in order to protect the mobile device against brute
…show more content…
Phone catalog and contacts.
. Incoming, outcoming, and missed calls.
. Incoming, outcoming text messages and MMS.
. Sounds recording, vocal notes, and calling sounds.
. Pictures, images, video.
. Calendar, alarm clocks, and reminders.
. E-mails saved at the phone, notes.
. Web history browsing, cookies, internet temporary files (if the mobile phone has the internet navigation option).
. Any type of documentation in the next formats: Word, PDF, Excel, etc.
. User identifiers such as PIN, personal information, etc.
. Device identifiers such as IMEI.
. Network´s used such as home wifi connection, work place wifi, free networks, etc.
. Geo-location information.
. Predictive words added. (Androulidakis.
…show more content…
It is necessary in order to carry out a professional research, the digital forensic investigator will need to follow strict and specific techniques for data acquisition, maintenance of evidences to avoid data alteration/destruction, information analysis, and final presentation of the results obtained. (Androulidakis. 2012).
Taking into account that the device selected for a digital forensic research was used for a criminal activity, how can the researcher find relevant information to be used as evidence?. If the mobile device was found in the crime scene, can the investigator determine who was the user (the mobile phone owner or a third person) at the crime moment?. The mobile phone could be abandoned deliberately at the crime scene?. The information contained at the mobile phone, could be altered intentionally? (Androulidakis. 2012).
Other circumstances apart of digital environment should be considered in order to preserve every evidences such as fingerprints, DNA (if blood was found), drugs and guns at the crime scene, etc. Simply data acquisition is not enough, therefore, a digital forensic researcher should be follow some steps before to acquire valid and relevant information. (Androulidakis.

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Holmes/Scarpetta Project- The Valley of Fear What discipline was involved? Digital Forensics (cryptology)- The process of encrypting messages and examining digital media forensically to find, analyze, and present facts and opinions. What was the equipment used? The ciphers represent the pages of previous editions of Whitaker's Almanack.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    They should not discount any electronic device because it seems like it would not have data. Sources that should be responded to are any electronic devices that contains data such as desktop computers, gaming systems, laptops, e-mail, any information system, financial information system, human resources information system, learning management system, Internet service, network, television, chat logs, images, etc. Preserving evidence should be in the forefront of the investigators. If the incident is from a Federal…

    • 196 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    When it comes to criminal trials, there are many important pieces of evidence. Forensic Science: Evidence, Clues, and Investigation by Andrea Campbell, explains that forensic evidence uses sources such as fingerprints, hair particles, and mainly hard evidence. The story also explains that there are a couple downfalls when using this evidence. One main downfall falls heavily on the investigators who handle the substances. Even though they’ve collected hard, substantial, evidence, it is hard for the jury to trust the hands that dealt with it.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    a) Consent to Search In R v. Wills (1992) the court found the following criteria necessary for a valid consent search: 1. There was consent, expressed or implied; 2. The giver of the consent had the authority to give the consent; 3. The consent was voluntary (not police coerced); 4. The giver of consent was aware of the police conduct; 5.…

    • 1052 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It is impeditive that Forensic Professionals become accustomed to documentation of services early in their career not only for the consideration of ethical guidelines but for legal requirements as well. Forensic Professionals are encouraged to recognize importance of documentation of all data. According to APA Specialty Guidelines for Forensic Professionals, Documentation consist of any forms of proof that maybe subpoenaed for review by the courts or used as a reference during an expert testimony such as, letters, consultations, notes, recordings, transcriptions; assessments, test, scoring reports and interpretations and all other forms of proof major or minor that were created or exchanged. Documentation also consist of obtaining proper consent…

    • 1267 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In order to establish an effective forensic readiness plan in the private sector, three major requirements need to be fulfilled. The first requirement is appropriate technology. Technology is critical in helping the organisation obtain evidence, preserve and protect…

    • 843 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Bloodstain Patterns

    • 651 Words
    • 3 Pages

    Physical evidence that is left behind in a crime scene plays and important role in reconstructing the various events that took place during the crime . Crime scene reconstruction depends upon joint efforts of law enforcement personnels, medical examiners and criminologist to find the physical evidence and to understand the events that surrounds the occurrence of a crime. If there is a bloodstains then the location and the distribution of the blood stain along with the spatters maybe useful in explaining the events that caused the bleeding. An investigator can decipher from an individual bloodstain, the direction of blood, when it impacted the surface it was deposited on. Bloodstain patterns, consisting of many individual bloodstains…

    • 651 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    During a trial in court to prove an offender guilty, the prosecutor will use all types of evidence such as, testimonies, direct, circumstantial, or physical. Though most of the case is based off of forensic evidence because it is the most important as stated in “Forensic Evidence” by Andrea Campbell. Forensic science is a science applied to answering legal questions regarding crimes scenes and the people involved in them, it falls under physical evidence because it can be found by scientific means such as fingerprints and DNA test. And it can also be hard evidence such as weapons and clothing.…

    • 243 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Digital Forensics

    • 755 Words
    • 4 Pages

    In preparing for processing the potential crime/incident scene, I would have my digital forensics team to understand and perform the following tasks: identify for potential digital evidence, understand rules of evidence, prepare for the search and seize digital evidence, and to ensure proper storage/chain of evidence processes are properly documented and followed. Computers and digital media are progressively involved in unlawful exercises. The computer maybe contraband, products of the crime, an instrument of the offense, or just a storage that holds evidence of the offense. Investigation of any criminal activity may deliver electronic proof.…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Essay On Bullet Shooting

    • 824 Words
    • 4 Pages

    Once the scene is secured all physical evidence must be found, documented, identified, collected, photographed and preserved properly to ensure that there is no contamination. All evidence must be sent to the laboratory to be analyzed to determine what happened before and during a crime. Without the use of forensic science many crimes would go on solved and suspects can go free from committing crimes. The Advancement of technology in the 21st century with technology and science combined together has made it much easier for solving…

    • 824 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Throughout many centuries, it has always been important to know how and why crimes have been committed. Criminal Investigators have participated in solving countless of cases in order to prevent future crimes. Many victims and those accused, which are known to be innocent, have been assisted to receive justice due to the help from the system. This job profession is just as important as any others in the federal justice system. Forensics investigation is a standard scientific application to criminal investigations, also an execution to law procedures ensuring evidence to present in court.…

    • 1540 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Moreover, these mobile devices make life more enjoyable. For example, people can surf the internet, play games, watch movies, and check emails. Not to mention, that you do not need to memorize your contact lists neither carry an address book with you. What you just need to do is to add your contact lists to your cell phone’s address book and save. All the information is save in the cell phone’s memory, and you do not need to worry about it.…

    • 879 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Thousands of people cannot adapt without their phones; it has become a need. This is why people feel they need to check their texts, messages, social media pages. Plus, phones operate for navigation, homework, news, banking, jobs, plus more. Also, they are a helpful source ultimately.…

    • 775 Words
    • 4 Pages
    Improved Essays