Monday, April 22, 2019

Week 6 class discussions Assignment Example | Topics and Well Written Essays - 500 words

Week 6 class discussions - Assignment ExampleWatermarking communication usually takes value in a one-to-many communication outline while steganography communication takes place in a point-to-point communication. some(prenominal) stenography and watermarking hide the content and existence of the message while cryptography hides the content but not the existence of the message, they are therefore mutually exclusive (Stefan & Fabien, 2000). Watermarking, cryptography, and stenography aim at securing messages from attackers.The benefits of ADS outweigh the risks as files can be hidden on an NTFS hard disk in a way that is unwieldy to detect as long as there are proper security features to handle them and system administrators are aware of the streams. If Microsoft discontinues support of ADS in future versions of its operating system, the forensic industry would suffer a big blow as it would not be able to find most of the copies of some graze for its forensic investigations. This i s because streams are retained if a file is copied with ADS to another NTFS, which is very important for forensics.The most real obstacle to successful backing up data and/or recovering data for forensic investigators is neediness of cooperation from the management (Wiles & Rogers, 2007). The management is responsible at providing funds and direction regarding backing up and recovering of data. However, cod to many computer malpractices many managers get involved into, they fear that they might be caught one twenty-four hours when a forensic investigation is make and therefore might not fully cooperate in regard to backing up and recovering done for forensic purposes.Forensic investigation is normally done to unearth the vices done in an organization. The results of forensic investigation are normally taken to law courts for wakeless actions to be taken. In the event that a system forensic is to be done, many people in the case normally do the much they can to destroy evidence in the computers. They do this by destroying computer systems, deleting

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.