Steganography For Computer Digital Forensics Tools Week 5 Discussion Hello, I need help with a discussion can anyone help please? No Plagiarism…work will

Steganography For Computer Digital Forensics Tools Week 5 Discussion Hello, I need help with a discussion can anyone help please? No Plagiarism…work will be checked on turnitin and studypool… with references if possible please. just 2 paragraphs This week’s reading gives you basic technical information about passwords and encryption, and how to
recover data protected by these mechanisms. There is also a section on Steganography, which literally
translated means “covered writing.” When some people think of steganography, or “stego,” they think
of documents or other data files being hidden in other file types (usually image/picture files). This is
something that is used frequently in secreting child pornography to avert detection. Interestingly, the
use of stego goes much farther back than the use of computers.
Like cryptology, steganography is used to hide something in something else. So, even though a code
breaker can detect the hidden code, they may not be aware that the code actually contains a different
message. Cryptography scrambles a message so that it is unreadable, but still visible, while stego
camouflages data to hide it or make it undetectable. This course is not meant to teach you about the
technical details of encryption or passwords or steganography (entire books are written on each of
those subjects), but rather to help you understand their place in the criminal justice process.
Does a warrant give you the authority to break passwords protecting information or to decipher
encrypted data? This is a very important question. As many of you have discussed in our previous week’s
discussions, it is important to make sure you know the limits of your warrant. But while you are
conducting a search with a properly executed warrant, you may come across other information that is
not included in your scope, but is still evidence of a crime. For example, imagine you are searching a
hard drive for information related to a fraud scheme. While you are looking through the files you come
across a picture that is obviously child pornography, but you do not have child pornography addressed in
any way within your warrant. What do you do? The proper response is to stop the search and obtain
another warrant for evidence related to child pornography. The same thing applies to discovering
encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain
evidence. Some may even use steganography techniques to hide other files.
For this week’s discussion, complete the following questions below in detail. Please discuss thoroughly
and substantively in your post. You are not required to respond to a classmate in this week’s discussion,
however, respond in a thorough, substantive, intelligent way to your fellow classmates will add to our
discussion and learning of this week’s topic!
1) List and explain five (5) examples of how steganography were used BEFORE the advent of computers.
2) List and explain five (5) examples of how encryption (or cryptology) were used BEFORE the advent of
computers.
3) Discuss how steganography and encryption could be used legitimately, and why this could cause you
a problem as a computer forensic examiner.
This week’s reading gives you basic technical information about passwords and encryption, and how to
recover data protected by these mechanisms. There is also a section on Steganography, which literally
translated means “covered writing.” When some people think of steganography, or “stego,” they think
of documents or other data files being hidden in other file types (usually image/picture files). This is
something that is used frequently in secreting child pornography to avert detection. Interestingly, the
use of stego goes much farther back than the use of computers.
Like cryptology, steganography is used to hide something in something else. So, even though a code
breaker can detect the hidden code, they may not be aware that the code actually contains a different
message. Cryptography scrambles a message so that it is unreadable, but still visible, while stego
camouflages data to hide it or make it undetectable. This course is not meant to teach you about the
technical details of encryption or passwords or steganography (entire books are written on each of
those subjects), but rather to help you understand their place in the criminal justice process.
Does a warrant give you the authority to break passwords protecting information or to decipher
encrypted data? This is a very important question. As many of you have discussed in our previous week’s
discussions, it is important to make sure you know the limits of your warrant. But while you are
conducting a search with a properly executed warrant, you may come across other information that is
not included in your scope, but is still evidence of a crime. For example, imagine you are searching a
hard drive for information related to a fraud scheme. While you are looking through the files you come
across a picture that is obviously child pornography, but you do not have child pornography addressed in
any way within your warrant. What do you do? The proper response is to stop the search and obtain
another warrant for evidence related to child pornography. The same thing applies to discovering
encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain
evidence. Some may even use steganography techniques to hide other files.
For this week’s discussion, complete the following questions below in detail. Please discuss thoroughly
and substantively in your post. You are not required to respond to a classmate in this week’s discussion,
however, respond in a thorough, substantive, intelligent way to your fellow classmates will add to our
discussion and learning of this week’s topic!
1) List and explain five (5) examples of how steganography were used BEFORE the advent of computers.
2) List and explain five (5) examples of how encryption (or cryptology) were used BEFORE the advent of
computers.
3) Discuss how steganography and encryption could be used legitimately, and why this could cause you
a problem as a computer forensic examiner.
Helpful Readings:
https://www.garykessler.net/library/fsc_stego.html
http://www.evidencemagazine.com/index.php?option=com_content&task=view&id=656

Purchase answer to see full
attachment

Don't use plagiarized sources. Get Your Custom Essay on
Steganography For Computer Digital Forensics Tools Week 5 Discussion Hello, I need help with a discussion can anyone help please? No Plagiarism…work will
Just from $13/Page
Order Essay
Homework Writings Pro
Calculate your paper price
Pages (550 words)
Approximate price: -

Why should I choose Homework Writings Pro as my essay writing service?

We Follow Instructions and Give Quality Papers

We are strict in following paper instructions. You are welcome to provide directions to your writer, who will follow it as a law in customizing your paper. Quality is guaranteed! Every paper is carefully checked before delivery. Our writers are professionals and always deliver the highest quality work.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Reasonable Prices and Free Unlimited Revisions

Typical student budget? No problem. Affordable rates, generous discounts - the more you order, the more you save. We reward loyalty and welcome new customers. Furthermore, if you think we missed something, please send your order for a free review. You can do this yourself by logging into your personal account or by contacting our support..

Essay Delivered On Time and 100% Money-Back-Guarantee

Your essay will arrive on time, or even before your deadline – even if you request your paper within hours. You won’t be kept waiting, so relax and work on other tasks.We also guatantee a refund in case you decide to cancel your order.

100% Original Essay and Confidentiality

Anti-plagiarism policy. The authenticity of each essay is carefully checked, resulting in truly unique works. Our collaboration is a secret kept safe with us. We only need your email address to send you a unique username and password. We never share personal customer information.

24/7 Customer Support

We recognize that people around the world use our services in different time zones, so we have a support team that is happy to help you use our service. Our writing service has a 24/7 support policy. Contact us and discover all the details that may interest you!

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Our reputation for excellence in providing professional tailor-made essay writing services to students of different academic levels is the best proof of our reliability and quality of service we offer.

Essays

Essay Writing Service

When using our academic writing services, you can get help with different types of work including college essays, research articles, writing, essay writing, various academic reports, book reports and so on. Whatever your task, homeworkwritingspro.com has experienced specialists qualified enough to handle it professionally.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our professional editor will check your grammar to make sure it is free from errors. You can rest assured that we will do our best to provide you with a piece of dignified academic writing. Homeworkwritingpro experts can manage any assignment in any academic field.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.