Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Data can be stored in various places and there are significant reasons to understand it

Data can be stored in various places and there are significant reasons to understand it

Computer Science

Data can be stored in various places and there are significant reasons to understand it. Please answer the following:

 

  1. Choose three areas where data can be stored and describe the storage location and describe the positive and negative issues of data being stored in those locations.
  2. What does hashing data mean and how is it used in criminal justice?
  3. How does a digital forensic analyst find data in files that may be lost, and do they need to consider any restrictions caused by cyber law or the 4th Amendment to the Constitution?
  4. Describe three laws that concern digital/computer crimes, and provide some substance for why they were created. 

 

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Answer 1:

Data can be stored in the following 3 storage locations given below:

  • Local storage:

This storage is usually fitted inside the electronic device and is available for offline use. the data on this storage can be destructed if the device malfunctions

  • External storage:

This storage can be peripherally connected to the main device in order to access the information stored on the storage device. It is portable but is not always accessible.

  • Cloud storage:

This storage can be accessed via the internet. The data is secure and accessible from any device connected to the internet but is inaccessible if the internet is not available.

---------------------------------------------------------------------------------------------------------------------------------------------------------------------

Answer 2:

Hashing data refers to a type of encryption of data by the use of mathematical algorithms, in terms of criminal justice, with the help of decryption key, Original data can be recovered.

---------------------------------------------------------------------------------------------------------------------------------------------------------------------

Answer 3:

A Digital forensic analyst is able to find data files that may be lost by looking into the recovery sectors of a storage device in a given electronic device. They do not need to consider the laws before doing so because they do not perform such action until given permission and order.

---------------------------------------------------------------------------------------------------------------------------------------------------------------------

Answer 4:

The following laws are created with regards to cyber security and Digital crimes -

  • Computer fraud and abuse act:

This law was created in 1980 and was revised in 1990 and it was created in order to prevent individuals from accessing protected information on devices which belong to other individuals.

  • Children's online privacy Protection Act:

This law was created in 2012 in order to protect the privacy of children especially those who were below the age of 13.

  • Electronic Communications privacy act:

This law was created in 1986 which gives the right to government for accessing Digital information with the help of a subpoena and without warrant in case an item was in custody for more than 180 days.

Related Questions