Wireless Security and Forensics

I’m studying for my Computer Science class and need an explanation.

After you have read this article on best practices for collecting live (volatile data) I would like you to do some research as this ties in to mobile forensics.

https://www.cwagweb.org/wp-content/uploads/2018/05…

This was from 2018.

Are there other steps that you might want to consider which this article may have overlooked either based on your readings in the textbook OR based on your experience (or even suspicions?)

If you need help researching this then try search queries like “best practices for collecting live data” or “best practices for collecting volatile data” or ” framework for forensically collecting live data”

Please discuss! This is can be a fun topic!

Leave a Reply

Your email address will not be published.