Provide 4 strategies for preventing and detecting computer crimes.
Name some committers of cyber crimes.
Explain the redundant array of independent disks (RAID) strategy.
Provide the most used backup and restoration strategy for data.