Monday, June 10, 2019
Week 6 class discussions Assignment Example | Topics and Well Written Essays - 500 words
Week 6 class discussions - Assignment ExampleWatermarking communication usually takes place in a one-to-many communication system while steganography communication takes place in a point-to-point communication. Both stenography and watermarking hide the content and human beings of the message while cryptography hides the content but not the existence of the message, they are therefore mutually exclusive (Stefan & Fabien, 2000). Watermarking, cryptography, and stenography aim at securing messages from attackers.The benefits of ADS outbalance the risks as files can be hidden on an NTFS hard disk in a way that is difficult to detect as long as there are proper security features to handle them and system administrators are aware of the streams. If Microsoft discontinues support of ADS in future versions of its operating system, the rhetorical industry would stand a big blow as it would not be able to find most of the copies of some work for its forensic investigations. This is becau se streams are retained if a file is copied with ADS to another NTFS, which is very important for forensics.The most significant obstacle to successful backing up data and/or recovering data for forensic investigators is lack of cooperation from the management (Wiles & Rogers, 2007). The management is responsible at providing funds and direction regarding backing up and recovering of data. However, due to many computer malpractices many managers contain involved into, they fear that they might be caught one day when a forensic investigation is done and therefore might not fully stand by in regard to backing up and recovering done for forensic purposes.Forensic investigation is normally done to unearth the vices done in an organization. The results of forensic investigation are normally taken to law courts for legal actions to be taken. In the event that a system forensic is to be done, many people in the case normally do the much they can to destroy evidence in the computers. The y do this through destroying computer systems, deleting
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment