BUS 082 Lecture Notes - Lecture 17: Array Data Structure, Hash Table, Digital Evidence

13 views2 pages

Document Summary

Need to be able to prove that the data acquired and analysed belonged to a particular person. Computer forensic analyst will usually take photographs of the computer at the workplace in its normal position with post-it notes etc. attached. This provides evidence of it being that persons computer. Notes of discussions with organisational managers, it security staff will be collected. Where each staff member must login using a user name and password. Is also proof of the persons profile. Good indicator they were operating the computer (assuming passwords are not compromised) In computer science, a hash table or hash map is a data structure that uses a hash function to efficiently map certain identifiers or keys (e. g. , person names) to associated values (e. g. , their telephone numbers, computer files) The hash function is used to transform the key into the index (the hash) of an. Any change to any file shows that changes to hashing number and file.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents