Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Practical Mobile Forensics
  • Table Of Contents Toc
  • Feedback & Rating feedback
Practical Mobile Forensics

Practical Mobile Forensics

4.4 (11)
close
close
Practical Mobile Forensics

Practical Mobile Forensics

4.4 (11)

Overview of this book

The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is required to follow this book.
Table of Contents (15 chapters)
close
close
10
10. Android Data Recovery Techniques
14
Index

Android security


Android was designed with a specific focus on security. Android as a platform offers and enforces certain features that safeguard the user data present on the mobile through multilayered security. There are certain safe-defaults that will protect the user and certain offerings that can be leveraged by the development community to build secure applications. The following are issues which are kept in mind while incorporating the Android security controls:

  • Protecting user-related data

  • Safeguarding the system resources

  • Making sure one application cannot access the data of another application

The next few concepts help us understand more about Android's security features and offerings. A detailed explanation on Android security can be found at http://source.android.com/devices/tech/security/.

Secure kernel

Linux has evolved as a trusted platform over the years, and Android has leveraged this fact by using it as its kernel. The user-based permission model of Linux has in fact worked...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY