Create a head ache for someone trying to re-write a program

Assignment Help Basic Computer Science
Reference no: EM132922099

Question: Reply to the post below. Of the NSA's ten First Principles of Cybersecurity, "information hiding" is listed as the seventh. Information hiding is fairly straightforward and it's applications and uses are numerous. Information hiding is the tactic of keeping only pertinent information accessible while keeping secure information inaccessible.

This can be accomplished by compiling data in a stack that only allows the information on top to be viewable or modifiable, encapsulating data or sets of instructions into a single unmodifiable entity and more nefariously hiding data in plain site layered into something like an image. These methods for hiding data prevent both intentional and unintentional modification to critical data important for the operational quality of the computer and its programs. By stacking data there may be layers under the viewable stack that can be made accessible with the proper passwords or credentials. This prevents someone from seeing or modifying data that they are not qualified to interact with. Encapsulating data is similar, but takes away the ability to access the data within it all together.

This technique is also used to make programming cleaner and more efficient. Hiding data in plain site is often used maliciously to sneak data onto someones computer without them realizing it. Hidden imperceptibly in the immense amount of data for an image could be instructions to allow attacks. This method could also be used to share secure information and add an extra layer of security, but is less commonly used for this purpose. Regardless of how information hiding is deployed, the value it has to cybersecurity is huge.

It would seem obvious that you would not want to put all of your cards on the table for everyone to see. By compiling and encapsulating data you are able to do just that. Data hiding keeps the user from being overwhelmed by the intricacies of the data and/or accidentally modifying something that is crucial to the basic operation of the program. By employing data hiding, one can feel more secure about the accessibility of their data. Rather than making every detail of data available, it can be hidden behind or within other forms of data and made inaccessible.

This can create a head ache for someone trying to re-write a program, but is crucial to maintaining secure data and consistent operation especially if an attacker gets a hold of it.

Reference: Hale M. L., Gandhi R., Morrison B. B. (2018). Introduction to Cybersecurity First Principles. Nebraska GenCyber.

Reference no: EM132922099

Questions Cloud

Compute the before-tax expected return on the stock : Compute the before-tax expected return on the stock between time 1+ and time 2 when all shareholders are individuals (rS,i(1+))
Prepare the necessary journal entry on February : Total tablet sales were 10,000 tablets for $1,000,000 in 2020. Prepare the necessary journal entry on February 14, 2021
Determine the cost of the goods sold for each sale : Determine the cost of the goods sold for each sale and the inventory balance after each sale, presenting the data in the form illustrated in Exhibit 3
Discuss strategies that would reduce these conflicts : There is a debate on conflicts of interest that exist between certain bond ratings agencies, Discuss strategies that would reduce these conflicts
Create a head ache for someone trying to re-write a program : Create a head ache for someone trying to re-write a program, but is crucial to maintaining secure data and consistent operation especially if an attacker gets
Experiencing stressful situation in the workplace : Imagine you're mentoring one of the people in the scenario below who is experiencing a stressful situation in the workplace.
Create a spreadsheet for your payroll : Justine's hourly pay is $9.00. She worked 30 hours this week and is taxed at a 6% rate. Create a spreadsheet for your payroll
Critical importance of brain development : how you will share information on brain development with early childhood stakeholders to support understanding of the critical importance of brain development
What types of power have you had the best results using : What types of power have you had the best results using? Example? Its about appreciating power.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd