Forensic Glossary

Forensic Glossary

Forensic Glossary

Mobile Forensics Glossary

Mobile Forensics Glossary

Mobile Forensics Glossary

Key terms and definitions used in mobile device forensics, digital investigations, and evidence handling.
Key terms and definitions used in mobile device forensics, digital investigations, and evidence handling.
Key terms and definitions used in mobile device forensics, digital investigations, and evidence handling.
Logical Extraction

A forensic acquisition method that retrieves data accessible through the device operating system APIs, including contacts, call logs, SMS, app data, and media files. Non-invasive and widely supported.

File System Extraction

A deep extraction method that copies a device’s full file system, including hidden and system files beyond logical access, enabling recovery of deleted data remnants, app databases, and artifacts, widely used.

Physical Extraction

A complete bit-by-bit copy of a mobile device’s storage, including unallocated space. Enables recovery of deleted data, but typically requires device-specific exploits or direct hardware access safely now.

Logical Extraction

A forensic acquisition method that retrieves data accessible through the device operating system APIs, including contacts, call logs, SMS, app data, and media files. Non-invasive and widely supported.

File System Extraction

A deep extraction method that copies a device’s full file system, including hidden and system files beyond logical access, enabling recovery of deleted data remnants, app databases, and artifacts, widely used.

Physical Extraction

A complete bit-by-bit copy of a mobile device’s storage, including unallocated space. Enables recovery of deleted data, but typically requires device-specific exploits or direct hardware access safely now.

Logical Extraction

A forensic acquisition method that retrieves data accessible through the device operating system APIs, including contacts, call logs, SMS, app data, and media files. Non-invasive and widely supported.

File System Extraction

A deep extraction method that copies a device’s full file system, including hidden and system files beyond logical access, enabling recovery of deleted data remnants, app databases, and artifacts, widely used.

Physical Extraction

A complete bit-by-bit copy of a mobile device’s storage, including unallocated space. Enables recovery of deleted data, but typically requires device-specific exploits or direct hardware access safely now.

Secure & Scalable Infrastructure

Secure & Scalable Infrastructure

Secure & Scalable Infrastructure

Ready to Transform Your

Forensic Capabilities?

Ready to Transform Your

Forensic Capabilities?

Ready to Transform Your

Forensic Capabilities?

Experience the power of a proven digital forensics platform built for real-world
investigations. Get hands-on with advanced extraction.
Experience the power of a proven digital forensics platform built for real-world
investigations. Get hands-on with advanced extraction.
Experience the power of a proven digital forensics platform built for real-world
investigations. Get hands-on with advanced extraction.
Request a Demo

Request a Demo

Request a Demo

Experience a proven digital forensics platform with hands-on access to advanced extraction.
Experience a proven digital forensics platform with hands-on access to advanced extraction.
Experience a proven digital forensics platform with hands-on access to advanced extraction.
© 2026 Secfore. All rights reserved.
© 2026 Secfore. All rights reserved.
© 2026 Secfore. All rights reserved.