Does a warrant give you the authority to break passwords

Assignment Help Management Information Sys
Reference no: EM131735667

This week's reading gives you basic technical information about passwords and encryption, and how to recover data protected by these mechanisms.

There is also a section on Steganography, which literally translated means "covered writing." When some people think of steganography, or "stego," they think of documents or other data files being hidden in other file types (usually image/picture files).

This is something that is used frequently in secreting child pornography to avert detection. Interestingly, the use of stego goes much farther back than the use of computers.

Like cryptology, steganography is used to hide something in something else. So, even though a code breaker can detect the hidden code, they may not be aware that the code actually contains a different message.

Cryptography scrambles a message so that it is unreadable, but still visible, while stego camouflages data to hide it or make it undetectable.

This course is not meant to teach you about the technical details of encryption or passwords or steganography (entire books are written on each of those subjects), but rather to help you understand their place in the criminal justice process.

Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data?

This is a very important question. As many of you have discussed in our previous week's discussions, it is important to make sure you know the limits of your warrant.

But while you are conducting a search with a properly executed warrant, you may come across other information that is not included in your scope, but is still evidence of a crime.

For example, imagine you are searching a hard drive for information related to a fraud scheme. While you are looking through the files you come across a picture that is obviously child pornography, but you do not have child pornography addressed in any way within your warrant.

What do you do? The proper response is to stop the search and obtain another warrant for evidence related to child pornography. The same thing applies to discovering encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain evidence. Some may even use steganography techniques to hide other files.

For this week's discussion, complete the following questions below in detail. Please discuss thoroughly and substantively in your post. You are not required to respond to a classmate in this week's discussion, however, respond in a thorough, substantive, intelligent way to your fellow classmates will add to our discussion and learning of this week's topic!

1) List and explain five (5) examples of how steganography were used BEFORE the advent of computers.

2) List and explain five (5) examples of how encryption (or cryptology) were used BEFORE the advent of computers.

3) Discuss how steganography and encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.

Reference no: EM131735667

Questions Cloud

Discuss the elements of administrative law : Decker company and any major initiatives they have planned during the next 5 years and the elements of administrative law
Create presentation in which analyze your waste production : Create a 7- to 10-slide Microsoft PowerPoint presentation in which you analyze your waste production. How much of a difference would this make?
Submit alpha companys general journal entries for may : Use this information to submit Alpha Company's General Journal entries (without explanation) for May 2 & May 3 entries
Make-to-stock and make-to-order systems : Compare and contrast between make-to-stock and make-to-order systems. In your comparison, why does each system require different types of contracts?
Does a warrant give you the authority to break passwords : Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data?
What is maximum price grump can offer for rentleg center : The Rentleg Distribution Center is a warehouse complex near the Cincinnati Airport in Northern Kentucky, in a market where such buildings currently sell at 10%.
Discuss the picture and how everything will turn out : Try to tell what led to the situation depicted in the picture and how everything will turn out in the end
What is the cost of ending inventory for octagonal : Octagonal Company has the following information for 2018: What is the cost of ending inventory for Octagonal using the variable costing method
What world environmental issues might impact you indirectly : What world environmental issues might impact you indirectly? What actions by individuals or governments improve or harm global environment over your lifetime?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Integrated software application for patient records mgmt

Assume that you have been asked to procure a new integrated software application for patient records management.

  Common mistakes to avoid as a systems analyst

Common Mistakes to avoid as a Systems Analyst - What common errors does a new systems analyst often make when analyzing a problem?

  Discuss your rationale for choosing the specific firewall

From the first e-Activity, discuss your rationale for choosing the specific firewall in question, and determine the primary way in which a company could incorporate it into an enterprise network in order to enhance security.

  Calculating total manufacturing cost

Inventory balances for other financial data for et products are as follows:

  Iso 9000 standardsusing the iso website and other web

iso 9000 standardsusing the iso website and other web resources identify a situation where iso 9000 standards have been

  Supply chain management powerpointafter the initial report

supply chain management powerpointafter the initial report the owners of stone horse supply company john and michael

  How does purpose of erp differ from the purpose of mrp ii

If seasonal variations are present, is their incorporation into MRP fairly simple or fairly difficult? Explain briefly. How does the purpose of ERP differ from the purpose of MRP II? What are some unforeseen costs of ERP?

  How technologies or information systems have contributed

Discuss how technologies or information systems have contributed to the problem and how you will propose technology be implemented into the solution.

  Global value chain managementthe benefits of global value

global value chain managementthe benefits of global value chain management. the paper needs to address how the

  Describe a way to revamp or reinvent a business

Reinventing a Businss - Describe a way to revamp or reinvent a business using supply chain technologies.

  An expert response to supply chain managementhow does

an expert response to supply chain managementhow does netflixs business model work to coordinate incentives across its

  Provide an example of how to use the formula

What explanation would you give so that your staff understands that formula? Provide an example of how to use the formula. Develop a matrix using the formula as part of your example.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd