Answer the following in a single Word document.
Explain the process for cloning a hard drive.
Briefly explain in your own words the process for collecting digital evidence. Use the supplementary material above. (You can use the website https://www.wolframalpha.com/ as mentioned in the book on page 60.)
Provide the MD5 and the SHA256 hash values for the following phrases, "The quick brown fox jumped over the lazy dog." and ""The quick fox jumped over the brown lazy dog." "
Why is the value for each different?
How are hash values used in cyber investigations?