Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

This week's reading gives you basic technical information about passwords and encryption, and how to recover data protected by these mechanisms. There is also a section on Steganography, which literally translated means "covered writing." When some people think of steganography, or "stego," they think of documents or other data files being hidden in other file types (usually image/picture files). Interestingly, the use of stego goes much farther back than the use of computers. Like cryptology, steganography is used to hide something in something else. So, even though a code breaker can detect the hidden code, they may not be aware that the code actually contains a different message. Cryptography scrambles a message so that it is unreadable, but still visible, while stego camouflages data to hide it or make it undetectable. This course is not meant to teach you about the technical details of encryption or passwords or steganography (entire books are written on each of those subjects), but rather to help you understand their place in the criminal justice process.

Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data? This is a very important question. As many of you have discussed, it is important to make sure you know the limits of your warrant. But while you are conducting a search with a properly executed warrant, you may come across other information that is not included in your scope but is still evidence of a crime. For example, imagine you are searching a hard drive for information related to a fraud scheme. While you are looking through the files you come across a picture that is obviously child porn, but you do not have child porn addressed in any way by your warrant. What do you do? The proper response is to stop the search and obtain another warrant for evidence related to child pornography. The same thing applies to discovering encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain evidence. Some may even use stego techniques to hide other files.

This week I would like you to do some research on encryption and steganography. First, list five (5) examples each of how steganography and encryption or cryptology were used BEFORE the advent of computers. Then, discuss how stegonography or encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91838277
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question a signal was acquired at 200 hz and the spectrum

Question : A signal was acquired at 200 Hz and the spectrum showed a peak at 80 Hz. No anti- Max pts aliasing filter was used. Use the folding diagram to find the lowest 5 possible frequencies that the original signal ma ...

Task create an array that holds 100000 random integers

Task : Create an array that holds 100000 random integers between 1-100000. Allow the user to enter an integer to search. Create and implement modified bubble sort algorithm which will sort the array before the Binary Sea ...

What is the role of arp and how does it cause a security

What is the role of ARP and how does it cause a security concern? What is the different between global and private IP addresses? How does using NAT change a private IP address into a global IP address, and why is this so ...

Question sales tax in new york city is 8875write a function

Question : Sales tax in New York City is 8.875%. Write a function float computeTax(float saleamount) that takes the price of a purchase as input, and prints to the screen the amount of the purchase, the sales tax owed, a ...

Sometimes during the manufacturing of an integrated circuit

Sometimes during the manufacturing of an integrated circuit, wires-including control signal wires-are accidentally connected to +V or GND, resulting in a control signal that is stuck-at-1 (when connected to +V) or stuck- ...

Suppose i am designing a personnel database for a

Suppose I am designing a personnel database for a university. The university has three types of personnel: students, staff, and faculty. Here are the characteristics of the three groups: -All three groups have a name and ...

1 market equilibrium and deadweight lossa suppose that the

1. Market Equilibrium and Deadweight Loss a) Suppose that the supply and demand for apples are as follows: QD = 100 - 3P QS = 50 + 2P The government now levies a $5 per unit tax on producers. Draw the supply and demand c ...

Question as you are reviewing the results of your various

Question : As you are reviewing the results of your various scans, what factors do you believe you would take into consideration when determining priority? The priority would be used to determine remediation efforts. So, ...

What is the fraction defective if material hardness is

What is the fraction defective if material hardness is normally distributed with a mean of 42 and a standard deviation of 1 and the specification limits for hardness are from 35 to 45? What value for the process mean wil ...

Any help will be appreciatedscenarionbspyou are a

Any help will be appreciated Scenario: You are a networking and communications consultant working for HoustonComm Services, Inc, further referred to as HCS. HCS is a company providing technology consulting services to st ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As