Senin, 11 Desember 2017

Cell Phone Forensics On Cleaning Data

By Gary Cook


Everyone has a secret in the phone that you would not like exposed. It could be a photo, message, file, link, or anything that would compromise your position. When you want to give away the handset or sell it, such information needs to be cleared to prevent it from falling into unsafe hands. Cell phone forensics experts have recommended ways you can protect information from compromise.

Reset your handset to factory setting. Most people would go for this option before trying others. This will clear any information that was entered since you began using a handset as brand new. There are phones that give the option of locking some functions like retrieval. Unfortunately, the new owner will not use the handset effectively. This functionality depends on phone model and limits the extent to which you can safeguard your information.

Factory reset is not similar to wiping out information. This method works by hiding the information in a way that normal operations of your phone cannot retrieve it. It takes advanced technology to retrieve it. If a person is intent on retrieving this information, it will still be possible leading to compromise.

Data encrypting is another option. This is an option that is limited to certain handset models which means that it is exposed to limited use. It means that anyone trying to access information from that handset will have to provide an unlocking key. Since you will be the sole holder of the key, your information will be protected.

There are inbuilt capabilities to encrypt data. However, there are software that allow encrypting of information as an added feature. This means that you have to download such applications. Even these options do not guarantee safety because applications and systems have been hacked despite appearing secure. While some encrypt by default, you will need to activate such options for some phones.

Overwriting the existing data is also an option. The phone provides this option when you are about to save files. This creates more space for new files that need to be saved. It is also a way of damaging the existing data. This approach will allow you to skip the deleting element and head straight to saving data. It will still be possible for someone to retrieve information using advanced software despite overwriting.

External memory devices like SIM cards and SD cards should be removed. They are storage devices which hold files and information that you may consider confidential. Once you remove them from the phone, all the information that was stored in them disappears and cannot be accessed by the phones again. It can only be accessed once the cards are returned. This option will only work if you had chosen external storage for your data.

Technology advancement regarding information retrieval has complicated concealing. Even leaving a handset clean does not guarantee permanent hiding. The only guarantee most of these methods offer is inability to access by ordinary users. Phones provide directions on deleting information. Follow these directions to be on the safe side. However, the ultimate option when considering information security is to avoid having it on your handset if it posses any danger.




About the Author:



Tidak ada komentar:

Posting Komentar