Basic technical information about passwords

Assignment Help Basic Computer Science
Reference no: EM131095601

This week's reading gives you basic technical information about passwords and encryption, and how to recover data protected by these mechanisms. There is also a section on Steganography, which literally translated means "covered writing." When some people think of steganography, or "stego," they think of documents or other data files being hidden in other file types (usually image/picture files). Interestingly, the use of stego goes much farther back than the use of computers. Like cryptology, steganography is used to hide something in something else. So, even though a code breaker can detect the hidden code, they may not be aware that the code actually contains a different message. Cryptography scrambles a message so that it is unreadable, but still visible, while stego camouflages data to hide it or make it undetectable. This course is not meant to teach you about the technical details of encryption or passwords or steganography (entire books are written on each of those subjects), but rather to help you understand their place in the criminal justice process.

Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data? This is a very important question. As many of you have discussed, it is important to make sure you know the limits of your warrant. But while you are conducting a search with a properly executed warrant, you may come across other information that is not included in your scope but is still evidence of a crime. For example, imagine you are searching a hard drive for information related to a fraud scheme. While you are looking through the files you come across a picture that is obviously child porn, but you do not have child porn addressed in any way by your warrant. What do you do? The proper response is to stop the search and obtain another warrant for evidence related to child pornography. The same thing applies to discovering encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain evidence. Some may even use stego techniques to hide other files.

This week I would like you to do some research on encryption and steganography. First, list five (5) examples each of how steganography and encryption or cryptology were used BEFORE the advent of computers. Then, discuss how stegonography or encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.

Reference no: EM131095601

Questions Cloud

Some information about price elasticity of demand : Each scenario below gives some information about price elasticity of demand. For each, calculate the missing data, and determine if the price change under consideration will increase, decrease, or not change the firm's total revenue. Honest Abe\'s Us..
How distant places moving and relocation is supplied : Distant places moving & relocation is also supplied through packers and movers in India. Your goods & gadgets are added for your door. There is no need to lease greater vehicle.
Test case for system can cover : Consider the system S which can take input parameters and each parameters can take on M values, what is the number of pairs a single test case for this system can cover?
Dentist office database : This database is being created for the receptionist/manager of a dentist's office. The office has one dental assistant and one dentist.  Each performs various procedures and each procedure has a specific cost.
Basic technical information about passwords : This week's reading gives you basic technical information about passwords and encryption, and how to recover data protected by these mechanisms. There is also a section on Steganography, which literally translated means "covered writing."
Limitations of modelling in operations research : Adavantages and limitations of modelling in operations research
Prepare the various budgets that comprise the master budget : The company has gathered information from its managers in preparation of the budgeting process. This problem asks you to prepare the various budgets that comprise the master budget for 2014.
Program has finished gathering numbers : Design pseudocode for a program that allows a user to enter exactly 8 numbers. Create an array big enough to hold the numbers and store each number in the array as it's entered.
Demonstrate this property of the lms algorithm : Using Eq. (3.41), demonstrate this property of the LMS algorithm by considering the simple example of the algorithm using a single parameter

Reviews

Write a Review

Basic Computer Science Questions & Answers

  A tcp/ip ethernet network

Canyon College plans to offer night classes for business school students, paralegal students, and nurses, in five remote cities. Their plan is to have professors offer the classes from the main site, and to use video conferencing and multimedia optio..

  What are real world problems

Roach (2007) asserts that IT departments must work more closely with workers on the factory floor, breaking down barriers that have traditionally divided the two groups. The author suggests ways to do this. Discuss a potential challenge that this ..

  Explain how to satisfy storeitrite-s requirements

StoreItRite is interviewing candidates for position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy StoreItRite's requirements as stated above. How would a successful candidate respond?

  Write assembly code that computes average

Using MARS, write Assembly code (for RISC) that computes average of list of mideterm test scores in #  freshman ENGR121 class and return in $v0.

  Discuss the primary advantages of gui over a textual

include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

  Determine the tax rate

1. For salaries in the range $50,000-$74,999, the controlling expression's value will be 2. for salaries in the range $75,000-$99,999, the controlling expression's value will be 3. For all other salaries, use the default case.

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Text-to-speech-speech-to-text and voice recognition.

Speech recognition systems introduce great capabilities including text-to-speech, speech-to-text, and voice recognition.

  Position in euro futures contract

Suppose you are holding a long position in euro futures contract that matures in 76 days. The agreed upon price is $1.15 for 125,000 euro. At the close of trading today, the futures price has risen to $1.155. Under marking to market, you now

  Approximate number of fish

It has been determined that the number of fish f(t) that can be caught in t minutes in a certain pond using a certain bait is f(t) = 0.28t + 1, for t > 10. Find the approximate number of fish that can be caught if you fish for 38 minutes.

  Give cfg for the following language

Give CFG for the language L={x %u03F5 {0,1}*/x has unequal number of 0's and 1's}

  Explain the difference between portable internet access

Directions: Please provide detailed and elaborate responses to the following questions. Your responses should include examples from the reading assignments, if possible. Your answer to each question should be at least 250 words in length and uti..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd