Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
Cell Phone Protocols andOperating Systems ◾  311
The Need for a Faraday Bag
Cell phones are devices that connect to telecommunication networks through wireless signals.
Some cell phones can also connect to Bluetooth devices or wireless networks. If the security fea-
tures are not enabled on the cell phone, then it may be possible to connect to the phone and alter,
delete, or add digital evidence to the phone. It is very important that the digital evidence be pre-
served from the time of seizure until it is presented as evidence in court. If evidence is suspected
of being tampered with, it could be ruled as inadmissible in court. erefore, it is important for
CCEs to preserve digital evidence by using a Faraday bag and noting its usage on the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498