Discuss how steganography and encryption could be used

Assignment Help Other Subject
Reference no: EM132111964

This week's reading gives you basic technical information about passwords and encryption, and how to recover data protected by these mechanisms.

There is also a section on Steganography, which literally translated means "covered writing." When some people think of steganography, or "stego," they think of documents or other data files being hidden in other file types (usually image/picture files). This is something that is used frequently in secreting child pornography to avert detection. Interestingly, the use of stego goes much farther back than the use of computers.

Like cryptology, steganography is used to hide something in something else. So, even though a code breaker can detect the hidden code, they may not be aware that the code actually contains a different message.

Cryptography scrambles a message so that it is unreadable, but still visible, while stego camouflages data to hide it or make it undetectable. This course is not meant to teach you about the technical details of encryption or passwords or steganography (entire books are written on each of those subjects), but rather to help you understand their place in the criminal justice process.

Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data? This is a very important question. As many of you have discussed in our previous week's discussions, it is important to make sure you know the limits of your warrant.

But while you are conducting a search with a properly executed warrant, you may come across other information that is not included in your scope, but is still evidence of a crime. For example, imagine you are searching a hard drive for information related to a fraud scheme.

While you are looking through the files you come across a picture that is obviously child pornography, but you do not have child pornography addressed in any way within your warrant.

What do you do? The proper response is to stop the search and obtain another warrant for evidence related to child pornography. The same thing applies to discovering encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain evidence. Some may even use steganography techniques to hide other files.

For this week's discussion, complete the following questions below in detail. Please discuss thoroughly and substantively in your post. You are not required to respond to a classmate in this week's discussion, however, respond in a thorough, substantive, intelligent way to your fellow classmates will add to our discussion and learning of this week's topic!

1) List and explain five (5) examples of how steganography were used BEFORE the advent of computers.

2) List and explain five (5) examples of how encryption (or cryptology) were used BEFORE the advent of computers.

3) Discuss how steganography and encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.

Reference no: EM132111964

Questions Cloud

Describe the reasonable person standard : How does mediation differ from arbitration? For each of these approaches, describe an example of a situation in health care where it might be utilized.
Briefly introduce and summarize the article : Briefly introduce and summarize the article. Identify the author's main points. Who is the author's intended audience?
Discuss developmental methods for strategic planning : Add a scenario-based planning component to your strategic plan that addresses a public health issue involving a pandemic response.
Compare the results you obtain for each individual : Compute the risk assessment score for each of these individuals using two of the risk assessment devices you located in your Collaborative Activity this week.
Discuss how steganography and encryption could be used : Discuss how steganography and encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.
What would apples best defense be : If the Modisettes' lawsuit alleges Apple's negligence, what is their best argument regarding negligence?
How did the progressive era contribute to modern corrections : How did Enlightenment philosophers contribute to current ideas on punishment? How did the Progressive Era contribute to modern corrections?
Did the police have qualified immunity : The Citation provides all reference numbers a case, including defendant and plaintiff names.
Discuss the american court system from criminal justice : Discuss the American court system from Criminal Justice A Brief Introduction by Frank Schmalleger.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd