WHY STUDENT PREFER US?  
4.9/5

5 Star Rating

93940

Orders Deliver

3949

PhD Experts

24x7

Support

100%

Privacy

100%

Top Quality

Sample Details

Computer Forensics Steganography

Number Of View : 10

Download : 0

Pages: 2

Words : 366

Question :

 

Define steganography, why an attacker or criminal might use it, and what tools can be used by the investigator to determine if steganography has been used?

Discuss the role that volatility plays in a digital forensics investigation and how you would approach recovering the most volatile data.

 

Answer :

 

Steganography can be defined as a practice of concealing a message, video, file, or image in other files, messages, videos, or images. The information is encoded in other similar looking innocent files such as image files, video files, etc.

It is used by attackers or criminals to communicate with their partners about critical information about their plans. It also helps them to identify all networks that are under surveillance of police or intelligence agencies. They can use steganography to communicate secretly with their partners (Tao et al., 2018). They can encode the message in a simple image and hence the filtering system cannot detect the message because the system will consider it an image file. 

There are various tools that could be used to detect steganography such as Steganabara, Stegbeak, StegCraker, etc. 

Volatile data can be defined as the data that is stored in volatile memory such as RAM. Volatile data should be considered to be a part of the digital forensic process. It helps in providing important as well as crucial information that could not be acquired by the traditional forensic process. Following traditional forensic processes could not help in identifying and analyzing the current state of the system, open ports, username as well as password, running processes, recently established connection, anti-forensic activities, traces of malware, unencrypted data as well as keys (Memaripour et al., 2020). But volatility would certainly help in identifying and analyzing such information that is crucial to conduct a forensic investigation.

 

Recovering the most volatile data

Mobile devices such as smartphones contain information to help in collecting evidence or to allow more informed decisions to be made. From the internal memory of the mobile devices, such information can be retrieved. There are several tools that could also be used to recover the most volatile data.

 

References 

Tao, J., Li, S., Zhang, X., & Wang, Z. (2018). Towards robust image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 29(2), 594-600.

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Order Now

Get Help Instantly

    FREE FEATURES

    Limitless Amendments

    $09.50 free

    Bibliography

    $10.50 free

    Outline

    $05.00 free

    Title page

    $07.50 free

    Formatting

    $07.50 free

    Plagiarism Report

    $10.00 free

    Get all these features for $50.00

    free

    Let's Talk

    Enter your email, and we shall get back to you in an hour.