Explain the challenges to acquiring data from RAID disks

computer science


Be certain to cite your sources using APA style, however, no credit will be provided for uncited sources or sources that do not resolve to reflect the correct answer. 
1. Discuss how a hashing algorithm is used in a forensic investigation to prove evidence integrity and discuss how using a tool shown to cause collisions could be detrimental to the case. Provide an example of an algorithm used to authenticate the data.
2. Explain the challenges to acquiring data from RAID disks.  
3. When would a remote acquisition be preferred?  What tool would you recommend, and why?
4. Describe 4 different ways that a criminal can hide data (think anti-forensics, too). How would you find each of these in your investigation?

Related Questions in computer science category