Be certain to cite your
1. Discuss how a hashing algorithm is used in a forensic investigation to prove evidence integrity and discuss how using a tool shown to cause collisions could be detrimental to the case. Provide an example of an algorithm used to authenticate the data.
2. Explain the challenges to acquiring data from RAID disks.
3. When would a remote acquisition be preferred? What tool would you recommend, and why?
4. Describe 4 different ways that a criminal can hide data (think anti-forensics, too). How would you find each of these in your investigation?