Basic technical information about passwords

Assignment Help Basic Computer Science
Reference no: EM131095601

This week's reading gives you basic technical information about passwords and encryption, and how to recover data protected by these mechanisms. There is also a section on Steganography, which literally translated means "covered writing." When some people think of steganography, or "stego," they think of documents or other data files being hidden in other file types (usually image/picture files). Interestingly, the use of stego goes much farther back than the use of computers. Like cryptology, steganography is used to hide something in something else. So, even though a code breaker can detect the hidden code, they may not be aware that the code actually contains a different message. Cryptography scrambles a message so that it is unreadable, but still visible, while stego camouflages data to hide it or make it undetectable. This course is not meant to teach you about the technical details of encryption or passwords or steganography (entire books are written on each of those subjects), but rather to help you understand their place in the criminal justice process.

Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data? This is a very important question. As many of you have discussed, it is important to make sure you know the limits of your warrant. But while you are conducting a search with a properly executed warrant, you may come across other information that is not included in your scope but is still evidence of a crime. For example, imagine you are searching a hard drive for information related to a fraud scheme. While you are looking through the files you come across a picture that is obviously child porn, but you do not have child porn addressed in any way by your warrant. What do you do? The proper response is to stop the search and obtain another warrant for evidence related to child pornography. The same thing applies to discovering encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain evidence. Some may even use stego techniques to hide other files.

This week I would like you to do some research on encryption and steganography. First, list five (5) examples each of how steganography and encryption or cryptology were used BEFORE the advent of computers. Then, discuss how stegonography or encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.

Reference no: EM131095601

Questions Cloud

Some information about price elasticity of demand : Each scenario below gives some information about price elasticity of demand. For each, calculate the missing data, and determine if the price change under consideration will increase, decrease, or not change the firm's total revenue. Honest Abe\'s Us..
How distant places moving and relocation is supplied : Distant places moving & relocation is also supplied through packers and movers in India. Your goods & gadgets are added for your door. There is no need to lease greater vehicle.
Test case for system can cover : Consider the system S which can take input parameters and each parameters can take on M values, what is the number of pairs a single test case for this system can cover?
Dentist office database : This database is being created for the receptionist/manager of a dentist's office. The office has one dental assistant and one dentist.  Each performs various procedures and each procedure has a specific cost.
Basic technical information about passwords : This week's reading gives you basic technical information about passwords and encryption, and how to recover data protected by these mechanisms. There is also a section on Steganography, which literally translated means "covered writing."
Limitations of modelling in operations research : Adavantages and limitations of modelling in operations research
Prepare the various budgets that comprise the master budget : The company has gathered information from its managers in preparation of the budgeting process. This problem asks you to prepare the various budgets that comprise the master budget for 2014.
Program has finished gathering numbers : Design pseudocode for a program that allows a user to enter exactly 8 numbers. Create an array big enough to hold the numbers and store each number in the array as it's entered.
Demonstrate this property of the lms algorithm : Using Eq. (3.41), demonstrate this property of the LMS algorithm by considering the simple example of the algorithm using a single parameter

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What kind of new input and output devices

What kind of new input and output devices do you think future computers might have. Why

  What is the relevance of the result for a program

What is the relevance of the result for a program calling the system() function?

  Decision to utilize components influence requirements

Must RMO consider using purchased components in the new CSS? If so, When, must it begin looking for components? How will decision to utilize components influence requirements, design and implementation phases?

  Designing vb applications across multiple platforms

Technical Project "Designing VB Applications Across Multiple Platforms"This assignment will contain two (2) Parts: Written Paper and Visual Basic Prototype. The Visual Basic Prototype is not included in the total page count but is included in the eva..

  Program to compute each semester tuition for each student

write a program to compute each semester the tuition for each student. Studient is taking 12 credit or less, tuition is 675 oer credit if student is taking more than 12 credits the total tuition is 6300.

  A program that accepts insurance policy data

A program that accepts insurance policy data, including a policy number, customer last name, customer first name, age, premium due date (month, day, and year), and number of driver accidents in the last three years. If an entered policy number is not..

  Is it possible for an instruction to be receiving forwarding

Is it possible for an instruction to be receiving forwarding information and simultaneously being flushed?If possible, can you provide an example sequence of instructions?

  Write a program called generateprimes

Write a program called generatePrimes.py that prompts the user for a number n and outputs all the primes less than or equal to n. You must use the algorithm described above.

  Main way of looking at things here

A lot of people are worried about 'Big Brother' watching them and believe that Facebook is an area in which this is the main way of looking at things here.

  Determine the file slack

How do you determine the file slack, RAM slack and drive slack on NTFS 4gb disk and FAT16 3gb disks for a document containing 10,000 characters?

  Two choices for compensation

Mr. Vasquez has been given two choices for his compensation. He can have $20,000 cash plus $500 per month for 10 years, or he can receive $12,000 cash plus $1000 per month for 5 years. If the interest rate is 8%, which is the better offer?

  Edmonds-karp algorithm for finding the maximum flow

1. Edmonds-Karp algorithm for finding the maximum flow of O (NM 2 ) 2. Method push predpotoka finding maximum flow of O (N 4 ) 3. Modified method for pushing predpotoka O (N 3 ) 4. Feed restrictions 5. The flow of minimal cost (min-cost-flow). Algori..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd