Jumpstart Your Paper

Browse our Free Essay examples and check out our Writing tools to get your assignments done.

Digital Steganography in Computer Forensics

Pages:
10 page
Sources:
10
Solution:
Solution Available NOW
Subject:
TECHNOLOGY
Language:
English (U.S.)
Date:
Total cost:
$ 30

INSTRUCTIONS:

Conduct research on the following: Digital Steganography in Computer forensics.

 

Background or main idea: Steganography is the art and science of hiding messages from view. It is a concern for computer forensics examiners in that many techniques involve hiding bits of digital information inside everything from audio files to word documents. Construct a research paper that explores the need for computer forensic experts to focus more strongly on digital steganography. Explore how it has been involved in computer crimes of the past and the amount of training in the subject that computer forensics experts go through today> Include the advances in technology.

 

Proposed Outline:

1.0 Introduction to Steganography

2.0 Need for computer forensic experts to focus more strongly on digital steganography

Reason 1

Reason 2

Reason 3

Reason 4

Reason 5

3.0 How Steganography has been involved in computer crime. (Use examples)

Way 1

Way 2

Way 3

Way 4

4.0 Amount of training in the subject that computer forensics experts go through today

Talk about the level of education required

Certification (mention bodies that are used to certify experts in this field)

5.0 Steganography advances in technology today

How has the practices improved?

 

Mention new technologies and maybe, emerging trends.

6.0 Conclusion

 

 

A good quality research paper usually contains in excess of 10. Sources should be less than 10 years old and if using statistical data, it should be less than 5 years old. Do not forget to use in text citations to credit your sources. Note that references used for your research need to be peer-reviewed/scholarly journals. These journals typically have the following characteristics:

1. Articles are reviewed by a panel of experts before they are accepted for publication;

2. Articles are written by a scholar or specialist in the field;

3. Articles report on original research or experimentation;

4. Are often published by professional associations;

5. Utilize terminology associated with the discipline.

 

The paper should be of high quality, free of spelling and grammatical errors, and of original work.

SOLUTION:

 

Digital Steganography in Computer Forensics

Student’s Name

Institutional Affiliation

Digital Steganography in Computer Forensics

Abstract

Steganography describes the tendency of camouflaging information. In digital environment, it involves curtaining of facts and information to avoid detection by unsuspecting eyes. The art of hiding communication between people underlines the growing popularity of masking facts and statistics through technological platforms. As a new area of concern, digital steganography provides computer forensics experts with significant challenges as cybercriminals add the skill to their collection of weaponry. As a result, this paper explores the need for computer forensic specialists to focus more strongly on digital steganography due to its constant use in propagating online criminal activities. The research investigates both the legitimate and illegitimate application of digital steganography. It concludes that concealing private communication is helpful as it protects copyright materials and enhances secure connections, but also, provides criminals such as terrorists with platforms to exchange information that threatens national and global peace. Consequently, the paper highlights the prerequisite for professionals to concentrate on the diverse systems of masking information to recognize and diminish the threat of cyber-crimes that affects national security.


 

1.0  Introduction

Steganography denotes the practices of concealing information. In the digital word, it entails the camouflaging of facts and statistics in high-tech files and structures. In their study Abdulla, Sellahewa, and Jassim (2019) defines digital steganography as the addition of small bits of confidences in other files such as images to conceal data from innocent persons. It is difficult to identify the hidden messages, making it a suitable method of passing information through digital platforms such as Facebook, Twitter, and emails. The popularity of masking evidence in advanced technological platforms poses a significant challenge to computer forensics experts. Stakeholders such as the National Security Agency (NSA) provide consciousness on information curtaining techniques used by organized crime groups. As a result, there is a need for computer forensic experts to focus more strongly on digital steganography due to its continued use in propagating crimes through the provision of training and awareness.

2.0  The Need for Computer Forensic Experts to Focus on Digital Steganography

a.      Digital Steganography Detects Malware

Experts need to concentrate on digital steganography as cyber-criminals use it conceal information and avoid malware uncovering. Focusing on the influence of secret communication, Lin, Wang, Chen, Lin, and Lin (2017) suggest that authorities such as NSA identify the camouflage of facts and statistics, underlying the danger of these practices that require observation. The growth of these methods arises from the inadequacy in malware recognition with only a few agencies such as the Federal Bureau of Investigation (FBI) running their repositories. Through focusing on data concealment, forensic professionals will acknowledge the challenges that result from cyber attribution for the unauthorized software detected on Internet. E-crime involves experienced perpetrators who deter the link of a digital trail back to its basis, allowing hackers to enhance their activities by hiding information. Forensics investigators should focus on the evolution of steganography techniques and improve malware detection approaches since criminals continue to protect information to perpetrate cyber espionage.

b.      Digital Steganography Encrypts Messages

Cyber-crime detectives should recognize the relevance of digital steganography as it supports the encryption of sensitive messages. For example, the national defense forces rely on coded message to pass crucial and sensitive data. According to Alharbi (2013), hiding information in unsuspicious online structures is a popular method of protecting identities and vital...

GET THE WHOLE PAPER!

Not exactly what you need?

Do you need a custom essay? Order right now:
ORDER
Related Topics: