Telecommunication Engineering Question One

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Telecommunication engineering

Question one

Question two

Mobile phone forensics, the most challenging digital forensics task to tackle, necessitates

the examination of a SIM card forensics solution. Digital forensics is concerned with the

examination of data, hardware, and artifacts. Numerous studies are being conducted with the

purpose of locating critical evidence in mobile phones. Telephone numbers dialed and dates

dialed, as well as telephone numbers phoned and returned in a phone book, contact information

is kept. The telephone numbers phoned, the dates and timings of the calls.

Sim cards

SIM cards found in mobile phones, set-top boxes, and other similar devices are really

UICC cards, which include an integrated circuit that allows the device to interact with the nearest

cell tower, as opposed to traditional SIM cards. SIM cards are more often used to refer to these

smart cards than UICC cards, which are more commonly used to refer to UICC cards. Forensic

analysts may find the information obtained by using a SIM card to be quite relevant in some

investigations. The SIM card of a suspect has a wealth of information on the suspect's phone

activities and preferences. Obtaining the phone numbers of callers and recipients may be

valuable to investigators in their investigations. Additionally, they may come across important

Contacts and SMS data that they need (such as sender and receiver information, time and date,
and SMS content). A client database, call detail records (CDR), and a home location register

(HLR) are all examples of additional information that service providers may save on their

servers. The card's own information is included: A microprocessor (CPU), a serial connection

module (SCM), read-only memory (ROM), random access memory (RAM), and data memory

are the internal components of a computer (EPROM or E2PROM) SIM (Subscriber Identity

Module) is technically only one of a plethora of applications on the smart card that perform

numerous functions (the UICC). In theory, a single UICC may include many SIM cards,

allowing it to access multiple phone numbers or accounts. This is, however, an uncommon

occurrence in practice. While a "12-in-1" SIM card is currently available, they are very

uncommon or non-existent in India. The SIM card contains a CPU, an I/O interface, and volatile

and non-volatile memory. These several parts work in concert to compute the majority of

answers to the challenges provided. Diagram below shows the functional and logical structure of

the SIM card.

Figure 1: The functional and logical structure of SIM card


The evidential value of sim cards

Question three

You might also like