<p><p>Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secret
Mobile Phone Security and Forensics: A Practical Approach
β Scribed by Iosif I. Androulidakis (auth.)
- Publisher
- Springer International Publishing
- Year
- 2016
- Tongue
- English
- Leaves
- 128
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used βagainstβ users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.
β¦ Table of Contents
Front Matter....Pages i-xi
Introduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones....Pages 1-14
A Multinational Survey on Usersβ Practices, Perceptions, and Awareness Regarding Mobile Phone Security....Pages 15-28
Voice, SMS, and Identification Data Interception in GSM....Pages 29-46
Software and Hardware Mobile Phone Tricks....Pages 47-69
SMS Security Issues....Pages 71-86
Mobile Phone Forensics....Pages 87-109
Conclusion....Pages 111-113
Back Matter....Pages 115-120
β¦ Subjects
Communications Engineering, Networks; Systems and Data Security; Security Science and Technology; Forensic Science
π SIMILAR VOLUMES
<p><p>PBX Security and Forensics presents readers with theoretical and practical background for Private Branch Exchanges (PBXs). PBX is privately owned equipment that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other us
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving P
<p><p>This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics invol
<span><p><b>Investigate, analyze, and report iOS, Android, and Windows devices</b></p><p><b>About This Book</b></p><ul><li>Get hands-on experience in performing simple to complex mobile forensics techniques.</li><li>Retrieve and analyze data stored not only on mobile devices but also through the clo
Investigate, analyze, and report iOS, Android, and Windows devices Key Features β’ Get hands-on experience in performing simple to complex mobile forensics techniques β’ Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected mediums β’ A practic