Apart from SQLite and plist files, several other locations may contain valuable information to an investigation.
The other sources include the following:
Cookies
Keyboard cache
Photos
Thumbnails
Wallpaper
Recordings
Third-party applications
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.