O'Reilly logo

Android Forensics by Andrew Hoog

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Android device, data, and app security

Information in this chapter

Introduction

There is a delicate balance in being both a forensic analyst and a privacy advocate. If a device were 100% secured, then forensic investigation of the device would fail to return any information. On the other hand, if a device’s security measures were completely absent, forensic expertise would hardly be necessary to extract meaningful data from the device.

The primary consumers of mobile forensics are law enforcement and government agencies. They use and secure many types of sensitive ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required