1) Explain the methods through which suspects hide, encrypt or password protect incriminating evidence. What procedures are used by the suspect in order to hide the files on suspect drive, or formatted media and how does computer forensics investigator examine the hidden, password protected or the encrypted files with forensics tools?
2) The American National Standards Institute (ANSI) Standards Planning and the Requirements Committee describes _____ several data models