What if the device has Google Advanced Protection Program? Would Google's Advanced Protection contribute towards forensics in any way by collaborating with Google without rooting the device?, considering that the device’s owner's Security Certificate of Google's Advanced Protection may be compromised after rooting that device for forensics means.
Do you teach any threat modeling development? I was more interested in the threat-modeling methods that have been developed. These methods are highly effective at finding security flaws in product designs, and have been incorporated into the Security Development Lifecycle. They can be combined to create a more robust and well-rounded view of potential threats. Not all of them are comprehensive; some are abstract and others are people-centric. Some methods focus specifically on risk or privacy concerns.
I worked with a mobile phone forensics expert from Eclipse Forensics they are amazing at their job!
What if the device has Google Advanced Protection Program?
Would Google's Advanced Protection contribute towards forensics in any way by collaborating with Google without rooting the device?, considering that the device’s owner's Security Certificate of Google's Advanced Protection may be compromised after rooting that device for forensics means.
Is jailbreaking on an Ios iphone compatible with forensic expertise because we add elements to the phone to analyze?
Do you teach any threat modeling development? I was more interested in the threat-modeling methods that have been developed. These methods are highly effective at finding security flaws in product designs, and have been incorporated into the Security Development Lifecycle. They can be combined to create a more robust and well-rounded view of potential threats. Not all of them are comprehensive; some are abstract and others are people-centric. Some methods focus specifically on risk or privacy concerns.
Very nice!