Contact Information
- 15800 Progress, Mora, MN, 55051
- info@preessays.com
- +1-786-220-3368
Browse our Free Essay examples and check out our Writing tools to get your assignments done.
Conduct
research on the following: Digital Steganography in Computer forensics.
Background
or main idea: Steganography is the art and science of hiding messages from
view. It is a concern for computer forensics examiners in that many techniques
involve hiding bits of digital information inside everything from audio files
to word documents. Construct a research paper that explores the need for
computer forensic experts to focus more strongly on digital steganography.
Explore how it has been involved in computer crimes of the past and the amount
of training in the subject that computer forensics experts go through today>
Include the advances in technology.
Proposed Outline:
1.0
Introduction to Steganography
2.0
Need for computer forensic experts to focus more strongly on digital
steganography
Reason 1
Reason 2
Reason 3
Reason 4
Reason 5
3.0 How
Steganography has been involved in computer crime. (Use examples)
Way 1
Way 2
Way 3
Way 4
4.0
Amount of training in the subject that computer forensics experts go through
today
Talk about the level
of education required
Certification
(mention bodies that are used to certify experts in this field)
5.0
Steganography advances in technology today
How has the practices
improved?
Mention new
technologies and maybe, emerging trends.
6.0
Conclusion
A good
quality research paper usually contains in excess of 10. Sources should be
less than 10 years old and if using statistical data, it should be less than 5
years old. Do not forget to use in text citations to credit your sources.
Note that references used for your research need to be peer-reviewed/scholarly
journals. These journals typically have the following characteristics:
1.
Articles are reviewed by a panel of experts before they are accepted for
publication;
2.
Articles are written by a scholar or specialist in the field;
3.
Articles report on original research or experimentation;
4. Are
often published by professional associations;
5.
Utilize terminology associated with the discipline.
The
paper should be of high quality, free of spelling and grammatical errors, and
of original work.
Digital Steganography in Computer Forensics
Student’s Name
Institutional Affiliation
Digital Steganography in Computer Forensics
Abstract
Steganography describes the tendency of camouflaging
information. In digital environment, it involves curtaining of facts and
information to avoid detection by unsuspecting eyes. The art of hiding
communication between people underlines the growing popularity of masking facts
and statistics through technological platforms. As a new area of concern,
digital steganography provides computer forensics experts with significant
challenges as cybercriminals add the skill to their collection of weaponry. As
a result, this paper explores the need for computer forensic specialists to
focus more strongly on digital steganography due to its constant use in propagating
online criminal activities. The research investigates both the legitimate and
illegitimate application of digital steganography. It concludes that concealing
private communication is helpful as it protects copyright materials and
enhances secure connections, but also, provides criminals such as terrorists
with platforms to exchange information that threatens national and global
peace. Consequently, the paper highlights the prerequisite for professionals to
concentrate on the diverse systems of masking information to recognize and diminish
the threat of cyber-crimes that affects national security.
1.0 Introduction
Steganography
denotes the practices of concealing information. In the digital word, it
entails the camouflaging of facts and statistics in high-tech files and
structures. In their study Abdulla, Sellahewa, and Jassim (2019) defines
digital steganography as the addition of small bits of confidences in other
files such as images to conceal data from innocent persons. It is difficult to
identify the hidden messages, making it a suitable method of passing
information through digital platforms such as Facebook, Twitter, and emails. The
popularity of masking evidence in advanced technological platforms poses a
significant challenge to computer forensics experts. Stakeholders such as the
National Security Agency (NSA) provide consciousness on information curtaining
techniques used by organized crime groups. As a result, there is a need for
computer forensic experts to focus more strongly on digital steganography due
to its continued use in propagating crimes through the provision of training
and awareness.
2.0 The Need for Computer Forensic
Experts to Focus on Digital Steganography
a.
Digital
Steganography Detects Malware
Experts
need to concentrate on digital steganography as cyber-criminals use it conceal
information and avoid malware uncovering. Focusing on the influence of secret
communication, Lin, Wang, Chen, Lin, and Lin (2017) suggest that authorities
such as NSA identify the camouflage of facts and statistics, underlying the
danger of these practices that require observation. The growth of these methods
arises from the inadequacy in malware recognition with only a few agencies such
as the Federal Bureau of Investigation (FBI) running their repositories. Through
focusing on data concealment, forensic professionals will acknowledge the
challenges that result from cyber attribution for the unauthorized software
detected on Internet. E-crime involves experienced perpetrators who deter the
link of a digital trail back to its basis, allowing hackers to enhance their
activities by hiding information. Forensics investigators should focus on the
evolution of steganography techniques and improve malware detection approaches
since criminals continue to protect information to perpetrate cyber espionage.
b. Digital Steganography Encrypts
Messages
Cyber-crime detectives should recognize the relevance of digital steganography as it supports the encryption of sensitive messages. For example, the national defense forces rely on coded message to pass crucial and sensitive data. According to Alharbi (2013), hiding information in unsuspicious online structures is a popular method of protecting identities and vital...