Sunday, December 22, 2019
Steganography Critical Review - 721 Words
Purpose This critical review is to investigate steganographic studies and their methods to either exfiltrate data or defend against data exfiltration. Steganography has one main purpose, to conceal data. Huangââ¬â¢s (2011) method, embedding steganographic data in inactive frames of low-bit rate audio streams went against the norm (Aoki, 2008), (Wu et al., 2006), used active frames of high-bit rate audio streams. Active high-bit rate audio streams have higher least significant bit counts, which presents added frames to conceal steganographic payloads (Huang et al., 2011). Howbeit, Huang (2011) demonstrated a new algorithm he administered to (VOIP) inactive frames of low-bit audio streams, which could carry higher capacity payloads thanâ⬠¦show more contentâ⬠¦Nagarajaââ¬â¢s (2011) research purpose was to initiate future studies into defensive measures against botnets. Botnets have a unique ability to coordinate the sending and receiving of new commands to bots that grant the botmaster immense power to execute criminal activities, such as, phishing attacks, DDoS attacks, and ransomware attacks (Nagaraja, et al., 2011). Which have intensified to where presently botnets control hundreds of thousands of hosts and produce millions of dollars in revenue for their creators (Nagaraja, et al., 2011). Contrary to traditional botnets, Stegobotââ¬â¢s communication traffic does not open new communication endpoints between the bots (Nagaraja, et al., 2011). Stegobot takes advantage of social media networks by operating along the edges, while utilizing image steganography techniques to hide covert communication during the interchanging of images among users (Nagaraja, et al., 2011). Network traffic visualization method designed by Mazurczyk (2012) focuses on network anomaly detection principles. Mazurczykââ¬â¢s main purpose of doing his research was to detect anomalies in network traffic flow, that can cause malicious actions that could compromise network s ecurity. Typical anomaly detection methods instituted across networks focus on discovering illegal activities orchestrated by probable attackers (Mazurczyk, et al., 2012). Current security devices lack the effectiveness needed in todayââ¬â¢s immense traffic volumes that need current real-timeShow MoreRelatedSteganography Analysis : Steganography And Steganography1592 Words à |à 7 Pages1 Steganography and its introduction Steganography comes from the Greek word ââ¬Å"Steganographiaâ⬠(ÃÆ'Ãâà µÃ ³Ã ±Ã ½ÃÅ'-Ãâ, à ³Ã à ±Ãâ -à µÃ ¹Ã ½) which means ââ¬Å"covered writingâ⬠. It is the art and science of concealing a secret information within a cover media preventing unauthorized people to know that something is hidden in it, so that the message can only be detected by its intended recipient. Cryptography and Steganography are ways of secure data transfer over the Internet 1.1.1 Cryptography and Steganography CryptographyRead MoreSecurity Issues and Principles Research Paper6107 Words à |à 25 PagesSECURITY ISSUES AND PRINCIPLES STEGANOGRAPHY [n. stÃ⢠nà ³ggrÃâ¢fi] Steganography (literally meaning covered writing) dates back to ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shaved messengers head, letting his hair grow back, and then shaving it again when he arrived at his contact point. Steganography comes from the Greek steganos, or covered, and graphie, or writing. Synonymous to abstraction, the art andRead MoreStatement of Purpose on Computer Science and Management614 Words à |à 3 PagesStructures, Algorithm Analysis and Design, DBMS, Data Warehousing and Data Mining. My inclination towards exploring the practical domain of computers led to my involvement in many projects like ââ¬ËVirtual DOS using JAVAââ¬â¢, ââ¬ËSteganographyââ¬â¢ and ââ¬ËHotel Management Systemââ¬â¢. I also wrote a review paper titled ââ¬ËMobile Agentââ¬â¢. My crowning achievement was my final year minor project, titled ââ¬ËFile System Simulation Using Cââ¬â¢. The positive feedback from my project guide, backed up with organization talent acquired throughRead MoreThe Threat Of Cyber Warfare1631 Words à |à 7 Pagesviolence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not. (Denning, 2000) The Army activated Army Cyber Command, 2d Army on 1 October 2010Read MoreE-Commerce Evolution2011 Words à |à 9 Pagesmetasearch engines for comparing on-line prices, databots or shopping bots, and on-line streaming. Amazon created a website where you could search for products (originally books/music); purchase them remotely; have them shipped to your door; and, review them all on-line. The company evolved into the 3-rd party distribution market which allowed vendors to sell their products through Amazonââ¬â¢s web store and with Amazon handling the transactions for a per-sale commission. This allowed for smaller vendorsRead MoreDigital Image Watermarking9991 Words à |à 40 Pagesencompasses those tasks that go into determining the needs or conditions to meet for a new or altered product, taking account of the possibly conflicting requirementsà of the variousà stakeholders, such as beneficiaries or users. Requirements analysis is critical to the success of a development project.à Requirementsà must be documented, actionable, measurable, testable, related to identified business needs or opportunities, and defined to a level of detail sufficient for system design. Requirements can beà architecturalRead MoreCulture Change as a Universal Intervention of Behaviour Change in Tobacco and Alcohol Use and Suicide3267 Words à |à 13 Pagespsychology and related subjects. Neural activity associated with decision making has been studied by neuroscientists. Health related behaviour change has been attempted and studied by health professionals. What is attempted through my work is to review available knowledge in these fields to formulate a culture-based universal technology to apply in the field of behaviour change related to alcohol, tobacco and suicide. RESULTS AND DISCUSSION Culture and human behaviour The term ââ¬Ëcultureââ¬â¢Read MoreCeh Cheat Sheet3910 Words à |à 16 Pages5) = 3564308997 Cryptography Cryptography is assumed pre-requisite for this class. Its still a good idea to review some core terminology before the exam. Terms and Definitions Plaint Text The data set before encryption Cipher Text The result of encryption Cryptanalysis Attempting to break and encryption algorithm Cryptography Obscuring the meaning of a message Steganography Hiding a message within another Salt Ensures different keys are created each time Initialization Vector ChangeRead MoreA Short Note On Storage Requirements And Data Distribution Requirements Essay4447 Words à |à 18 Pagescom/dynimg/IC139062.jpeg Symmetric encryption policy: - there are many ways to hide thing from information. First of all, cryptology. When we use Cryptology it take hidden link in a common method. Now a days we are use this one in daily life that is called steganography. Asymmetric encryption policy:- asymmetric encryption policy is second policy. Any time we select a symmetric key encryption algorithm hold true for asymmetric as well as. Lot of things which happens in past has trained that fully available algorithmRead MoreSystem Audit12707 Words à |à 51 Pagespractices, and operations. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively and efficiently to achieve the organization s goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement. PURPOSE OF IT AUDITS: An IT audit should not be confused with a financial statement audit. While there may be some abstract
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.