Discuss how a hashing algorithm is used in a forensic investigation to prove evidence integrity

computer science

Description

Be certain to cite your sources using APA style, however, no credit will be provided for uncited sources or sources that do not resolve to reflect the correct answer. 
1. Discuss how a hashing algorithm is used in a forensic investigation to prove evidence integrity and discuss how using a tool shown to cause collisions could be detrimental to the case.  Provide an example of an algorithm used to authenticate the data.
2. Explain the challenges to acquiring data from RAID disks.  
3. When would a remote acquisition be preferred?  What tool would you recommend, and why?
4. Describe 4 different ways that a criminal can hide data (think anti-forensics, too). How would you find each of these in your investigation?


Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.