The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device
碩士 === 國立交通大學 === 管理學院資訊管理學程 === 106 === Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/9j4589 |
id |
ndltd-TW-106NCTU5627088 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106NCTU56270882019-11-28T05:22:26Z http://ndltd.ncl.edu.tw/handle/9j4589 The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device 行動裝置應用鑑識工具擷取企業行動管理加密應用程式之數位證據研究 Chou, Po-How 邱柏豪 碩士 國立交通大學 管理學院資訊管理學程 106 Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices are widely used in daily life and also used in different fields, including medical, information processing, biometrics, financial transactions, navigation and positioning, and information science. The most popular applications for mobile are communication and email. However, the applications use in phishing, scams, or theft of data. The information-intensive environment, when a digital criminal record is to be verified, it is necessary for a professional digital forensic tool to verify it. However, the rapid development of information security and digital forensics has provided evidence of more evidence and credibility for the standardization and technology of digital forensics in the future. The encrypting applications from mobile, extracting sent and received letters and enterprise applications developed by the company, using digital forensics tools to process and retrieve feature information to identify the correctness of the source and verify the information extracted by the encrypted application. And indirectly understand whether it can provide evidence of favorable evidence and credibility. In the experiments of this paper, test results were obtained through the same forensic tools, mobile device systems, and encryption applications. In summary, the research results show that the evidence ability and credibility evidence provided by the digital forensic tools can be applied legally. However, the encrypted application can protect the enterprise data without being accessed by special permission or tools. And provide the correct digital evidence. Ku, Cheng-Yuan Ku 古政元 2018 學位論文 ; thesis 46 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 管理學院資訊管理學程 === 106 === Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices are widely used in daily life and also used in different fields, including medical, information processing, biometrics, financial transactions, navigation and positioning, and information science. The most popular applications for mobile are communication and email. However, the applications use in phishing, scams, or theft of data. The information-intensive environment, when a digital criminal record is to be verified, it is necessary for a professional digital forensic tool to verify it. However, the rapid development of information security and digital forensics has provided evidence of more evidence and credibility for the standardization and technology of digital forensics in the future.
The encrypting applications from mobile, extracting sent and received letters and enterprise applications developed by the company, using digital forensics tools to process and retrieve feature information to identify the correctness of the source and verify the information extracted by the encrypted application. And indirectly understand whether it can provide evidence of favorable evidence and credibility. In the experiments of this paper, test results were obtained through the same forensic tools, mobile device systems, and encryption applications.
In summary, the research results show that the evidence ability and credibility evidence provided by the digital forensic tools can be applied legally. However, the encrypted application can protect the enterprise data without being accessed by special permission or tools. And provide the correct digital evidence.
|
author2 |
Ku, Cheng-Yuan Ku |
author_facet |
Ku, Cheng-Yuan Ku Chou, Po-How 邱柏豪 |
author |
Chou, Po-How 邱柏豪 |
spellingShingle |
Chou, Po-How 邱柏豪 The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device |
author_sort |
Chou, Po-How |
title |
The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device |
title_short |
The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device |
title_full |
The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device |
title_fullStr |
The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device |
title_full_unstemmed |
The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device |
title_sort |
study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/9j4589 |
work_keys_str_mv |
AT choupohow thestudyonthecapturingdigitalevidencebyforensictoolswithenterprisemobilitymanagementencryptionapplicationbasedonmobiledevice AT qiūbǎiháo thestudyonthecapturingdigitalevidencebyforensictoolswithenterprisemobilitymanagementencryptionapplicationbasedonmobiledevice AT choupohow xíngdòngzhuāngzhìyīngyòngjiànshígōngjùxiéqǔqǐyèxíngdòngguǎnlǐjiāmìyīngyòngchéngshìzhīshùwèizhèngjùyánjiū AT qiūbǎiháo xíngdòngzhuāngzhìyīngyòngjiànshígōngjùxiéqǔqǐyèxíngdòngguǎnlǐjiāmìyīngyòngchéngshìzhīshùwèizhèngjùyánjiū AT choupohow studyonthecapturingdigitalevidencebyforensictoolswithenterprisemobilitymanagementencryptionapplicationbasedonmobiledevice AT qiūbǎiháo studyonthecapturingdigitalevidencebyforensictoolswithenterprisemobilitymanagementencryptionapplicationbasedonmobiledevice |
_version_ |
1719297831509950464 |