Topic > iPhone Security - 2391

iPhone Security Nowadays, technology is accelerating the way we communicate and the way we manage our personal lives. Zdziarski (2008) described: “How the iPhone quickly became a market leader in technology and was a huge success around the world” (preface.iX). The iPhone has become a very useful tool in many aspects of people's lives. However, people should be aware that this device can store a large amount of data in its memory, and that if you ever lose it or it is stolen, all of your personal and professional information can be available to anyone who gets their hands on it. Today many companies do their business directly from iPhones. Businessmen and non-entrepreneurs use the iPhone to do most of their office work or maintain contact with family and friends. For example, in commercial sectors today, most employees perform many of their tasks from anywhere and do not necessarily have to travel to the office and access their computers. Using the iPhone, employees can create important documents, save important announcements, and perform important transactions using the iPhone. On the other hand, people who are not in the commercial sector use iPhone for personal use. For example, talking to family, friends, or spending time searching the web in different areas that interest them. However, the iPhone contains in their memory sensitive information that belongs to the owner and information that may belong to other people with whom the owner of the iPhone had established a conversation or any type of chat on the network. Zdziarski (2008) described, "that the information saved in the iPhone's memory can be emails, photos, documents, text messages, phone... in between paper... items benefit from the iPhone. Engdahl (2011) described how police and forensic investigators must work together to find all the complete evidence that criminals left in the iPhone before committing the crime (p. 15). Law enforcement officers and forensic investigators will be able to confidently prosecute criminals involved in fraud, bribery and other corrupt practices and criminal acts. Judges and prosecutors must have all the evidence before sentencing any person to prison Law enforcement and computer forensics will never end because criminals use new tools to commit their crimes. In fact, the job of law enforcement and forensics is to reveal the hidden information of criminals who commit crimes to those who are innocent people..