Create a challenge for forensic experts during the analysis

Assignment Help Software Engineering
Reference no: EM132186896

Write article review with 2 APA references.

There are multiple information-hiding methods available to conceal evidence on victim systems which consequently create a challenge for forensic experts during the analysis process.

A recent article in the Communications of the ACM magazine suggests that we separate these covert data techniques into two categories: storage and communication (Mazurczyk & Wendzel, 2018).

Storage techniques include steganography and encryption in which the attacker conceals the data at rest on the victim systems. These set of techniques have been notably used by al Qaeda's members to organize terrorist operations and by Russian spies to extract confidential data from the United States (Mazurczyk & Wendzel, 2018). Communication techniques focuses on data in transit including tunneling and onion routing which make it challenging to trace a source (Fahey, 2018).

The anonymity provided by these methods simplify the act of hiding information by inhibiting attribution. Additionally, attackers can spoof their sessions and manipulate metadata or even timestamps to ensure forensic experts are not able to establish a timeline for the incident. A great example is the Silk Road investigation.

The Silk Road was an underground website that operated as a Tor hidden services using only cryptocurrency to solicit drugs and purchase illegal weapons. The complexity and depth of hidden information made this case challenging for the FBI investigators charged to discover the identity its creator, Ross Ulbricht (Norry, 2018).

From a biblical perspective, we can compare the value of being the light of the world noted in the book of Matthew to the role of cybersecurity professionals in bringing hidden information into the light. This Gospel highlights that is our good deeds that become the light and hope for others. If as Christians we live a godly exemplary life, we can attract others to join us in glorifying our God.

With the same mindset, if we model a cybersecurity professional that has integrity and ethical security practices, we can influence others within our organizations. "The light shines in the darkness, and the darkness has not overcome it (John 1:5, New International Version)."

References Fahey, R. (2018, March 30). Computer Forensics: Anti-Forensic Tools & Techniques. Retrieved December 3, 2018, from INFOSEC Institute: Mazurczyk, W., & Wendzel, S. (2018, January).

Information Hiding: Challenges For Forensic Experts. Retrieved December 3, 2018, from Communications of the ACM: Norry, A. (2018, November 20).

The History of Silk Road: A Tale of Drugs, Extortion & Bitcoin. Retrieved December 3, 2018, from Blockonomi:

The Holy Bible, New International Version. (1984). Grand Rapids: Zondervan Publishing House.

Attachment:- Article.rar

Verified Expert

The present solution is based on a review article of information hiding techniques. The solution is according to the given instruction with more than 100 words. The references used are given in APA format, to the end of the solution. The solution is completely free from plagiarism.

Reference no: EM132186896

Questions Cloud

Explain three specific factors that will impact : Explain whether or not this makes sense. Explain three specific factors that will impact how much of the tax is passed to customers.
Confidence interval for proportion based on sample : Find the 98% confidence interval for the proportion based on this sample.
What is the npv of the purchase of the company : What is the NPV of the purchase of the company when you include the consideration of the $20 million project?
What does friedrich hayek have to offer in terms : What does Friedrich Hayek have to offer in terms of how prices inform customers?
Create a challenge for forensic experts during the analysis : There are multiple information-hiding methods available to conceal evidence on victim systems which consequently create a challenge for forensic experts
Describe the concept of project management framework : Research the subject of Project Management Methodologies under Project Management Institute framework by reading articles, publications, white papers.
Why might such a guarantee lead to higher prices : Two firm in town sell yarn. Both advertise that they will beat their competitor's price. Why might such a guarantee lead to higher prices?
Think about the price systems effectiveness : What do you think about the price systems effectiveness as compared with Central Planning?
What do you think took place behind the scenes : Could it have been prevented and how? Based on what you have learned in this course, what do you think took place behind the scenes?

Reviews

Write a Review

Software Engineering Questions & Answers

  Develop the initial product backlog for the project

Take the project description and develop the initial product backlog for the project. Make sure each Product Backlog Item (user story) has a name, description, acceptance criteria, priority and initial estimate.

  When implementing a new system there are many different

when implementing a new system there are many different models that a company can choose to follow sdlc rad prototyping

  Explain how firm testing for each development method

Research, write, and provide a 4-6 page proposal of the alternative methods the firm might consider for completing the Frequent Shopper Program. Explain how the firm would conduct testing for each development method.

  Information security issues that organisations face

Create an initial post in which you take a position on the resources, methods and approaches that can help make firms more secure. In your post, summarise the top 3-5 major information security and compliance issues that organisations face.

  Write what is the impacts of e-commerce

Write what is the impacts of e-commerce on mobile platform. The key issues and in the main body please state the thesis properly.

  Costs for producing and selling

Ronald Enterprises, Ltd. has estimated the following costs for producing and selling 19,800 units of its product:

  What are two long-term benefits of e-scm

What are two market trends occurring in the SCM (Supply Chain Management) industry?

  What is ethical behavior

What is ethical behavior and what is not in regards to gathering information on a target without written consent? What biblical principles are applicable here

  Software architecture plays a different role

Software architecture plays a different role in different context. Select each one of these contexts, and describe software architecture's role in the context. Use an example to illustrate your point.Technical Project life cycle

  What is the standard name

What is the scope or intent of the standard - what are key terms and understandings needed for the standard to be understood and applied?

  Draw a context diagram and a level 0 logical dfd

Prepare a table of entities and activities.- Draw a context diagram.- Draw a physical data flow diagram (DFD).- Draw a level 0 logical DFD.

  Explain the process of testing software developed by using

q1. describe the process of testing software developed using both top-down and bottom-up development order.q2. propose

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd