b) Describe any five challenges of acquiring evidence from the cloud.
(5)
c) How does log data contribute to effective cloud forensics investigations? (5)
Question 4
[20 Marks]
a) In iOS backup, the sms.db file contains timestamp values, which could be in Unix
Epoch or Cocoa Core Data format. Determining the correct format is crucial for
accurate time-based analysis.
You are analysing an iOS backup and encounter a timestamp value of '672,345,890' in
the sms.db file. Explain without performing the real calculations how you would
determine whether this is a Unix Epoch or Cocoa Core Data timestamp.
(4)
b) Mobile forensic extraction from iOS artifact sources like the CallHistory.storedata
SQUte database, which holds call logs, requires selecting the right technique-logical,
filesystem, or cloud-based on device access, security, and investigation needs for
effective evidence collection.
Discuss when it is appropriate to perform mobile forensic data extraction from a typical
artifact source such as CallHistory.storedata SQUte database on an iOS device using
the following techniques:
{12)
i. logical extraction
(4)
ii. filesystem extraction, and
(4)
iii. cloud extraction.
(4)
Your response should emphasize when to use each method and why
not the other two alternatives in those specific scenario
c) The SQUte Write-Ahead Log (WAL) in an iPhone's sms.db file may hold important
artifacts
A forensic investigator needs to recover deleted text messages from an iPhone's
sms.db file. Explain the role of WAL in this process
(4)
Question 5
(20 marks]
The following presents four different scenarios involving a recovered iOS device after a
crime has been committed. For each scenario, the question asks for the actions that can be
taken to preserve information on the device. The scenarios are:
Page 2 of 3