Mostrar el registro sencillo del ítem

dc.contributor.advisorLedesma Álvarez, Gerson Damacio
dc.contributor.authorGarces Muñoz, Angeli Tamara
dc.date.accessioned2024-08-21T17:14:40Z
dc.date.available2024-08-21T17:14:40Z
dc.date.issued2024
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/16982
dc.descriptionThis-study examines the effectiveness of forensic tools used on Android devices, focusing on Andriller and AFLogical OSE. The objectives include a literature review of digital forensics and its applications on Android, identifying key forensic tools and evaluating their effectiveness in recovering digital evidence. Topics covered include digital forensics, stages and objectives of forensics, digital evidence, cybercrime, Android and how it works, forensic analysis on mobile devices. Tools such as Andriller, AFLogical OSE, Cellebrite UFED, FTK Imager and Magnet AXIOM were reviewed, but the actual testing focused mainly on Andriller and AFLogical OSE. The results show that both tools are effective in collecting and analyzing data from Android devices, although they have limitations depending on data type and device state. Andriller excels at extracting data from specific applications, while AFLogical OSE shows excellent performance in collecting logs and system communications. This study concluded that the combined use of various forensic tools can improve the accuracy and coverage of digital evidence collection. It also emphasizes the importance of constantly updating forensic tools and techniques to adapt to technological advances and new threats. These findings provide practical guidance for forensic investigators on the selection and use of forensic tools on Android devices.es_ES
dc.descriptionThis-study examines the effectiveness of forensic tools used on Android devices, focusing on Andriller and AFLogical OSE. The objectives include a literature review of digital forensics and its applications on Android, identifying key forensic tools and evaluating their effectiveness in recovering digital evidence. Topics covered include digital forensics, stages and objectives of forensics, digital evidence, cybercrime, Android and how it works, forensic analysis on mobile devices. Tools such as Andriller, AFLogical OSE, Cellebrite UFED, FTK Imager and Magnet AXIOM were reviewed, but the actual testing focused mainly on Andriller and AFLogical OSE. The results show that both tools are effective in collecting and analyzing data from Android devices, although they have limitations depending on data type and device state. Andriller excels at extracting data from specific applications, while AFLogical OSE shows excellent performance in collecting logs and system communications. This study concluded that the combined use of various forensic tools can improve the accuracy and coverage of digital evidence collection. It also emphasizes the importance of constantly updating forensic tools and techniques to adapt to technological advances and new threats. These findings provide practical guidance for forensic investigators on the selection and use of forensic tools on Android devices.es_ES
dc.description.abstractEste-estudio examina la eficacia de las herramientas forenses utilizadas en dispositivos Android, centrándose en Andriller y AFLogical OSE. Los objetivos incluyen una revisión de la literatura sobre ciencia forense digital y sus aplicaciones en Android, identificando herramientas forenses clave y evaluando su efectividad en la recuperación de evidencia digital. Se abarcan temas como la ciencia forense digital, etapas y objetivos de la ciencia forense, evidencia digital, cibercrimen, Android y su funcionamiento, análisis forense en dispositivos móviles. Se revisaron herramientas como Andriller, AFLogical OSE, Cellebrite UFED, FTK Imager y Magnet AXIOM, pero las pruebas reales se centraron principalmente en Andriller y AFLogical OSE. Los resultados muestran que ambas herramientas son efectivas para recopilar y analizar datos de dispositivos Android, aunque tienen limitaciones según el tipo de datos y el estado del dispositivo. Andriller se destaca en la extracción de datos de aplicaciones específicas, mientras que AFLogical OSE muestra un rendimiento excelente en la recopilación de registros y comunicaciones del sistema. Este estudio concluyó que el uso combinado de varias herramientas forenses puede mejorar la precisión y cobertura de la recopilación de evidencia digital. Además, enfatiza la importancia de actualizar constantemente las herramientas y técnicas forenses para adaptarse a los avances tecnológicos y las nuevas amenazas. Estos hallazgos brindan orientación práctica para los investigadores forenses sobre la selección y el uso de herramientas forenses en dispositivos Android.es_ES
dc.format.extent44 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2024es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectAnálisis forense digitales_ES
dc.subjectHerramientas forenseses_ES
dc.subjectAndroides_ES
dc.subjectAndrilleres_ES
dc.subjectAFLogical OSEes_ES
dc.titleAnálisis de herramientas forenses aplicado a dispositivos Android.es_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador