The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device

碩士 === 國立交通大學 === 管理學院資訊管理學程 === 106 === Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices...

Full description

Bibliographic Details
Main Authors: Chou, Po-How, 邱柏豪
Other Authors: Ku, Cheng-Yuan Ku
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/9j4589
id ndltd-TW-106NCTU5627088
record_format oai_dc
spelling ndltd-TW-106NCTU56270882019-11-28T05:22:26Z http://ndltd.ncl.edu.tw/handle/9j4589 The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device 行動裝置應用鑑識工具擷取企業行動管理加密應用程式之數位證據研究 Chou, Po-How 邱柏豪 碩士 國立交通大學 管理學院資訊管理學程 106 Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices are widely used in daily life and also used in different fields, including medical, information processing, biometrics, financial transactions, navigation and positioning, and information science. The most popular applications for mobile are communication and email. However, the applications use in phishing, scams, or theft of data. The information-intensive environment, when a digital criminal record is to be verified, it is necessary for a professional digital forensic tool to verify it. However, the rapid development of information security and digital forensics has provided evidence of more evidence and credibility for the standardization and technology of digital forensics in the future. The encrypting applications from mobile, extracting sent and received letters and enterprise applications developed by the company, using digital forensics tools to process and retrieve feature information to identify the correctness of the source and verify the information extracted by the encrypted application. And indirectly understand whether it can provide evidence of favorable evidence and credibility. In the experiments of this paper, test results were obtained through the same forensic tools, mobile device systems, and encryption applications. In summary, the research results show that the evidence ability and credibility evidence provided by the digital forensic tools can be applied legally. However, the encrypted application can protect the enterprise data without being accessed by special permission or tools. And provide the correct digital evidence. Ku, Cheng-Yuan Ku 古政元 2018 學位論文 ; thesis 46 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 管理學院資訊管理學程 === 106 === Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices are widely used in daily life and also used in different fields, including medical, information processing, biometrics, financial transactions, navigation and positioning, and information science. The most popular applications for mobile are communication and email. However, the applications use in phishing, scams, or theft of data. The information-intensive environment, when a digital criminal record is to be verified, it is necessary for a professional digital forensic tool to verify it. However, the rapid development of information security and digital forensics has provided evidence of more evidence and credibility for the standardization and technology of digital forensics in the future. The encrypting applications from mobile, extracting sent and received letters and enterprise applications developed by the company, using digital forensics tools to process and retrieve feature information to identify the correctness of the source and verify the information extracted by the encrypted application. And indirectly understand whether it can provide evidence of favorable evidence and credibility. In the experiments of this paper, test results were obtained through the same forensic tools, mobile device systems, and encryption applications. In summary, the research results show that the evidence ability and credibility evidence provided by the digital forensic tools can be applied legally. However, the encrypted application can protect the enterprise data without being accessed by special permission or tools. And provide the correct digital evidence.
author2 Ku, Cheng-Yuan Ku
author_facet Ku, Cheng-Yuan Ku
Chou, Po-How
邱柏豪
author Chou, Po-How
邱柏豪
spellingShingle Chou, Po-How
邱柏豪
The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device
author_sort Chou, Po-How
title The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device
title_short The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device
title_full The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device
title_fullStr The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device
title_full_unstemmed The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device
title_sort study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device
publishDate 2018
url http://ndltd.ncl.edu.tw/handle/9j4589
work_keys_str_mv AT choupohow thestudyonthecapturingdigitalevidencebyforensictoolswithenterprisemobilitymanagementencryptionapplicationbasedonmobiledevice
AT qiūbǎiháo thestudyonthecapturingdigitalevidencebyforensictoolswithenterprisemobilitymanagementencryptionapplicationbasedonmobiledevice
AT choupohow xíngdòngzhuāngzhìyīngyòngjiànshígōngjùxiéqǔqǐyèxíngdòngguǎnlǐjiāmìyīngyòngchéngshìzhīshùwèizhèngjùyánjiū
AT qiūbǎiháo xíngdòngzhuāngzhìyīngyòngjiànshígōngjùxiéqǔqǐyèxíngdòngguǎnlǐjiāmìyīngyòngchéngshìzhīshùwèizhèngjùyánjiū
AT choupohow studyonthecapturingdigitalevidencebyforensictoolswithenterprisemobilitymanagementencryptionapplicationbasedonmobiledevice
AT qiūbǎiháo studyonthecapturingdigitalevidencebyforensictoolswithenterprisemobilitymanagementencryptionapplicationbasedonmobiledevice
_version_ 1719297831509950464