Saturday, October 12, 2019
iPhone Security Essay -- Mobile Technology, Computer Forensics
iPhone Security Nowadays, technology is speeding our way of communication and the way in which we handle our personal lives. Zdziarski (2008) described, ââ¬Å"How the iPhone has quickly become a market leader in technology and has been a big success around the worldâ⬠(preface.iX). The iPhone has become a very useful tool in many aspects of people lives. However, people should be aware that this device can store a great amount of data in its memory and that if you ever lost or had it stolen all off your personal and professional information can be available to whoever has it in their hand. Today many companies do their business directly from the iPhones. Business people and non-business people alike are using the iPhone in order to achieve most of their office work or maintain contact with their family and friends. For example, in the commercial sectors most employees nowadays execute many of their tasks from anywhere and not necessarily have to go to their office and login into their computers. By using the iPhone employees can create important documents, save important announcements and do important transactions by using the iPhone. On the other hand, people who are not in the business sectors use the iPhone for their personal use. For example, talk with their family, friends, or spend time doing web searching in different areas that they are interested in. Nevertheless, the iPhone contains sensitive information in their memory that belongs to the owner and information that can belong to other people with who the owner of the iPhone had established a conversation or any type of chat in the network. Zdziarski (2008) described, ââ¬Å"that the information saved in the iPhone memory can be e-mails, photos, documents, text messages, phone... ...iminals are getting benefits from the iPhone. Engdahl (2011) described how the police and forensic investigators have to work together in order to find all the complete evidence that the criminals left in the iPhone before they committed their crime (p. 15). With the techniques, the skills, and knowledge of law enforcement officers and forensic investigators they will be able to confidently prosecute those criminals involved in fraud, bribery and other corrupt practices and criminal acts. Judges and prosecutors have to have all the evidence before they condemn any person to jail. The job of law enforcement and computer forensics will never end because the criminals are using new tools to commit their crime. In fact, the job of law enforcement and forensic is to reveal the hiding information of the criminals who commits crimes to those who are innocent people.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.