What is the purpose of a Message Digest 5 (MD5)/Secure Hash Algorithm (SHA)? Why would a forensic computer examiner run such an algorithm?

What will be an ideal response?


A Message Digest 5 (MD5)/Secure Hash Algorithm (SHA) takes a "fingerprint" of a hard disk drive (HDD) before and after forensic imaging. A forensic computer examiner would run such an algorithm to demonstrate that the forensic image recovered is all-inclusive of the original contents and that nothing was altered in the process.

Criminal Justice

You might also like to view...

Community policing is best characterized by which of the following?

a. providing service to citizens b. providing assistance to federal agencies c. providing strict law enforcement to the community d. police officers being primarily concerned with political interests

Criminal Justice

The Miranda warnings must be given prior to any custodial interrogation, regardless of the severity of the crime involved

a. True b. False

Criminal Justice

What is psychoanalytic theory and how does it define human behavior?

What will be an ideal response?

Criminal Justice

There are several reasons for thinking that tougher punishment is likely to work with drunk driving, including the fact that

a. the certainty requirement is already being met so a more severe punishment will strengthen the deterrent effect b. the drunk driver meets all of the assumptions set forth in the theory of deterrence c. people who drink and drive have a stake in society and feel threatened by the stigma of arrest d. a & c

Criminal Justice