Reference no: EM132186896
Write article review with 2 APA references.
There are multiple information-hiding methods available to conceal evidence on victim systems which consequently create a challenge for forensic experts during the analysis process.
A recent article in the Communications of the ACM magazine suggests that we separate these covert data techniques into two categories: storage and communication (Mazurczyk & Wendzel, 2018).
Storage techniques include steganography and encryption in which the attacker conceals the data at rest on the victim systems. These set of techniques have been notably used by al Qaeda's members to organize terrorist operations and by Russian spies to extract confidential data from the United States (Mazurczyk & Wendzel, 2018). Communication techniques focuses on data in transit including tunneling and onion routing which make it challenging to trace a source (Fahey, 2018).
The anonymity provided by these methods simplify the act of hiding information by inhibiting attribution. Additionally, attackers can spoof their sessions and manipulate metadata or even timestamps to ensure forensic experts are not able to establish a timeline for the incident. A great example is the Silk Road investigation.
The Silk Road was an underground website that operated as a Tor hidden services using only cryptocurrency to solicit drugs and purchase illegal weapons. The complexity and depth of hidden information made this case challenging for the FBI investigators charged to discover the identity its creator, Ross Ulbricht (Norry, 2018).
From a biblical perspective, we can compare the value of being the light of the world noted in the book of Matthew to the role of cybersecurity professionals in bringing hidden information into the light. This Gospel highlights that is our good deeds that become the light and hope for others. If as Christians we live a godly exemplary life, we can attract others to join us in glorifying our God.
With the same mindset, if we model a cybersecurity professional that has integrity and ethical security practices, we can influence others within our organizations. "The light shines in the darkness, and the darkness has not overcome it (John 1:5, New International Version)."
References Fahey, R. (2018, March 30). Computer Forensics: Anti-Forensic Tools & Techniques. Retrieved December 3, 2018, from INFOSEC Institute: Mazurczyk, W., & Wendzel, S. (2018, January).
Information Hiding: Challenges For Forensic Experts. Retrieved December 3, 2018, from Communications of the ACM: Norry, A. (2018, November 20).
The History of Silk Road: A Tale of Drugs, Extortion & Bitcoin. Retrieved December 3, 2018, from Blockonomi:
The Holy Bible, New International Version. (1984). Grand Rapids: Zondervan Publishing House.
Attachment:- Article.rar