This is to determine the effects resulting from the mining process on mobile resources, such as high CPU usage, high temperature, battery power consumption, and high temperature, in addition to the increase in RAM consumption, clarifying the results for each experiment, which are reflected in the mobile performance and functions. Measuring the impact of cryptocurrency mining on the main sources of the mobile while the mining program is running in the background and keeping the mobile screen in the login mode. Measuring the impact of cryptocurrency mining on the main resources of the mobile while the mining program is running in the background and keeping the mobile screen active. Measuring the impact of cryptocurrency mining on mobile resources when the mining program is running in the foreground of the system and keeping the screen idle. Measuring the impact of cryptocurrency mining on the main resources of the phone when the mining program is running in the foreground of the system while keeping the phone screen active. The experiments were conducted within four scenarios, which are as follows: A. In this chapter, we will work on measuring the impact of mining digital coins by mobile on the main resources of the phone, by means of experiments conducted on iOS devices and Android devices. The book will also be useful to anyone seeking a deeper understanding of mobile internals. Understand the relationship between mobile and desktop devices in criminal and corporate investigationsĪnalyze backup files and artifacts for forensic evidenceWho This Book Is Forįorensic examiners with little or basic experience in mobile forensics or open source solutions for mobile forensics. What You'll LearnAcquire and investigate data from mobile devices using forensically sound, industry-standard tools This book is your pathway to developing the critical thinking, analytical reasoning, and technical writing skills necessary to effectively work in a junior-level digital forensic or cybersecurity analyst role. You'll also gain an advanced understanding of computer forensics, focusing on mobile devices and other devices not classifiable as laptops, desktops, or servers. Practical cases and labs involving specialized hardware and software illustrate practical application and performance of data acquisition (including deleted data) and the analysis of extracted information. You’ll walkthrough the various phases of the mobile forensics process for both Android and iOS-based devices, including forensically extracting, collecting, and analyzing data and producing and disseminating reports. Using modern tools and techniques, this book shows you how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings. Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |