Explain steganography and its use in terrorism. What are the two positions on the steganographic threat to the U.S?
What will be an ideal response?
• The process refers to embedding hidden information in a picture, message, or another piece of information.
• It could be used to hide communications, steal information from security forces or an organization within the critical infrastructure, or provide opportunities for electronic attack
• One position claims that steganography is used by terrorist groups to communicate and launch cyberattacks.
• Some believe that it will be used in denial-of-service attacks or to deface websites.
• The other position claims that fear of steganography is the stuff of urban legends.
• Although steganography programs are readily available and difficult to detect or prevent with security hardware, statistical analysis programs of data contained in any Internet transmission readily reveal irregularities and the location of a hidden image.
• The belief is that the threat is not in the hidden image, the real threat is that the ability to decipher private communications based on threat that does not exist.
You might also like to view...
Which of the following is the database that contains chemical and color information pertaining to original automotive paints?
a. PDQ b. NIBIN c. SICAR d. IAFIS
The juvenile justice equivalent of prisons is
a. training schools b. detention centers c. Shelters d. Half-way houses
The materiality of evidence requested under Brady v. Maryland (1963) is decided by the trial judge
Indicate whether this statement is true or false.
Where does preparation for and proliferation of the problem-solving strategy begin?
A) field training B) recruit academies C) roll-call training D) in-service training