blog




  • Essay / iPhone Security - 2391

    iPhone Security Today, technology is accelerating the way we communicate and the way we manage our personal lives. Zdziarski (2008) described: “How the iPhone quickly became a technology market leader and achieved great success around the world” (preface.iX). The iPhone has become a very useful tool in many aspects of people's lives. However, people should be aware that this device can store a large amount of data in its memory and if you ever lose it or have it stolen, all of your personal and business information can be accessible to anyone who has it. Today, many businesses do their business directly from iPhones. Businessmen and non-professionals alike use iPhone to accomplish most of their office tasks or to maintain contact with family and friends. For example, in business sectors, most employees today perform many of their tasks from anywhere and do not necessarily need to go to their office and log on to their computer. Using the iPhone, employees can create important documents, record important announcements, and complete important transactions using the iPhone. On the other hand, people who are not in economic sectors use the iPhone for their personal use. For example, talk with their family, friends, or spend time researching on the web in different areas that interest them. However, the iPhone contains in its memory sensitive information that belongs to the owner and information that may belong to other people with whom the iPhone owner had established a conversation or any type of chat on the network. Zdziarski (2008) described "that information stored in iPhone memory can be emails, photos, documents, text messages, phone... in the middle of a sheet... the iminals benefit from the iPhone. Engdahl (2011) described how police and forensic investigators must work together in order to find all the complete evidence that criminals left in the iPhone before committing their crime (p. 15). With the techniques, skills and knowledge of law enforcement officers and forensic investigators, they will be able to confidently prosecute criminals involved in fraud, bribery and other corrupt practices and acts criminals. Judges and prosecutors must have all the evidence before sentencing anyone to prison. The work of law enforcement and computer forensics will never stop as criminals use new tools to commit their crime. In fact, the job of law enforcement and forensics is to reveal the hidden information of criminals who commit crimes to those who are innocent people..