Abstract
Mobile phones are a big part of today's life. However, these mobile phones are not built for data security and privacy, making them a common communication monitoring device. Communication monitoring is the control of the mobile device performance and data on hard drives or the transmission of data over networks such as the internet. This surveillance is often hidden and may be carried out by government, organizations or criminals. Digital forensics is the application of knowledge and expertise to legally extract information from any physical gadget, such as computers and smartphones. The purpose of this study was to propose a mobile forensic workflow for detecting and analyzing embedded threats that can be used as a surveillance tool at various levels of a mobile device.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have