StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Week 6 class discussions - Assignment Example

Cite this document
Summary
The main aim of cryptography is to protect the content of the message from unauthorized persons or programs. It ensures that communication between two devises happen securely over an insecure channel. Steganography means hiding…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Week 6 class discussions
Read Text Preview

Extract of sample "Week 6 class discussions"

Information Technology Security Information Technology Security Week 6 Discussion Cryptography means secrete writing (Coron, 2006). The main aim of cryptography is to protect the content of the message from unauthorized persons or programs. It ensures that communication between two devises happen securely over an insecure channel. Steganography means hiding of information in order not to be detected. It is advantageous to cryptography as the hidden message will not attract any audience. Watermarking involves embedding information to a host signal (Jiang, 2010).

It operates with the principle of robustness to be safe against any attacks. Watermarking communication usually takes place in a one-to-many communication system while steganography communication takes place in a point-to-point communication. Both stenography and watermarking hide the content and existence of the message while cryptography hides the content but not the existence of the message, they are therefore mutually exclusive (Stefan & Fabien, 2000). Watermarking, cryptography, and stenography aim at securing messages from attackers.

The benefits of ADS outweigh the risks as files can be hidden on an NTFS hard disk in a way that is difficult to detect as long as there are proper security features to handle them and system administrators are aware of the streams. If Microsoft discontinues support of ADS in future versions of its operating system, the forensic industry would suffer a big blow as it would not be able to find most of the copies of some work for its forensic investigations. This is because streams are retained if a file is copied with ADS to another NTFS, which is very important for forensics.

Week 6 Discussion 2 The most significant obstacle to successful backing up data and/or recovering data for forensic investigators is lack of cooperation from the management (Wiles & Rogers, 2007). The management is responsible at providing funds and direction regarding backing up and recovering of data. However, due to many computer malpractices many managers get involved into, they fear that they might be caught one day when a forensic investigation is done and therefore might not fully cooperate in regard to backing up and recovering done for forensic purposes.

Forensic investigation is normally done to unearth the vices done in an organization. The results of forensic investigation are normally taken to law courts for legal actions to be taken. In the event that a system forensic is to be done, many people in the case normally do the much they can to destroy evidence in the computers. They do this through destroying computer systems, deleting information, burning computers, or even passing magnetic objects over hard disk with an aim of destroying any evidence (Vacca, 2008).

If this is the case, such are information recovered and used for forensic investigations. Backup and recovery is therefore critical to the system forensics process to determine the potential effects on an investigation. Week 6 Discussion 3 The physical security features observed include security guards, fencing including electric fence, alarm system, fire extinguisher, surge protectors, one door under lock, labeled equipment, locking the CPU, and placing backup sites away from the place of operation.

Week 6 Discussion 4 Information security threats at my house My household information technology infrastructure will be vulnerable to the following threats: Virus attacks, password stealing, hardware and software theft, deletion of data, fire, and the power problems.Protecting the system against the threats The implementation will involve creating strong passwords, securing my house by locking it when not available, and installing antivirus software to protect the computer from malicious attacks, encrypting messages before sending, locking the CPU to prevent hardware theft components, using power surges and uninterruptible power supply, and fixing power extinguisher.

Reviewing and updating the plan New threats emerge every day. The plan will therefore be reviewed and updated periodically to cater for new threats and any information technology infrastructure added at home. References Coron, J. S. (2006). What is cryptography? IEEE Security and Privacy, 4(1), p. 70-73.Jiang, X. (2010). Digital watermarking and its application in image copyright protection. In 2010 International Conference on Intelligent Computation Technology and Automation, ICICTA 2010, May 11, 2010 - May 12, 2010.

Changsha, China: IEEE Computer Society.Stefan, K. & Fabien A. P. (2000). Information Hiding Techniques for Steganography and Digital Watermarking.Vacca, J. R. (2008). Computer forensics: Computer crime scene investigation. New York, NY: Cengage Learning.Wiles, J. & Rogers, R. (2007). Techno Securitys Guide to Managing Risks for IT Managers, Auditors, and Investigators. Security & Networking, Syngress, 1.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 6 class discussions Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Week 6 class discussions Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1621624-week-6-class-discussions
(Week 6 Class Discussions Assignment Example | Topics and Well Written Essays - 500 Words)
Week 6 Class Discussions Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1621624-week-6-class-discussions.
“Week 6 Class Discussions Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1621624-week-6-class-discussions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Week 6 class discussions

The discussion about time value of the money

I really appreciate the discussions presented in the class as I know that they will become instrumental in managing my financial resources in the future.... The discussion and lessons tackled during the week in this course made me realize a lot of things.... Student's NameInstructor's NameCourse Name25 November 2008Week 6: Integration Paper The discussion and lessons tackled during the week in this course made me realize a lot of things....
2 Pages (500 words) Essay

Cis week 5 classwork class discussions

Since most companies have confidential information about their customers, it is therefore a big risk if these data fall in the hands of hackers or people with malicious intentions. This is a way of embracing technology… Diligence should be taken to protect both the organizations and the customers. Most hacking is done through accessing employee's password....
1 Pages (250 words) Assignment

Discussion for online Business Ethics class - Week 3

He calls the corporation of today as the government of the propertied class, a concept similar to plutocracy and timocracy where privileged class dictates the terms and thus few is the number of happy people.... The purpose of this paper is to compare and contrast the work of two authors, Novak and Kelly, on the role of corporations and how it may impact the happiness amongst masses....
1 Pages (250 words) Essay

Group Discussion Pocess

It does not really matter to the group that it is an online class, since we were able to not only accomplish our set goals but also communicated and coordinated well; just like in the conventional groups.... Group work in an online class can be improved by setting clear goals to be met by individuals in the group, setting adequate time especially when all group members are available and making sure there are no disruptions to internet access.... We have been meeting twice or thrice per week depending on the issues we have to attend to....
1 Pages (250 words) Essay

Discussion Board Post Response

Demonstrating how the facility is losing money through transferring patients weighing more Response to week 6 Discussion Response to week 6 Discussion Schneider, I support your discussion in that Hoyer lifts are examples of capital expenditure.... Hoyer lifts are expensive and are long lasting....
1 Pages (250 words) Essay

Forms of Disruption in Class

The paper 'Forms of Disruption in class' presents the 2nd-grade students.... It is important to train them to listen and follow the teachers' instruction starting on the first day of class.... Any forms of disruption in class will not only result in classroom mismanagement but also hinders the learning progress of other students.... oitering around the classroom while the teacher is teaching in front of the class could distract the attention of other students who are willing to learn....
6 Pages (1500 words) Report

Happiness, Relationships and Personal Development

On my part, the past decisions include avoiding trusting my friends too much, engaging in class discussions, and seeking mentors to improve my social skills in life.... For the last few weeks, I have been so unhappy during class time and even in the field, but, the movie has given me some insights into a happier future.... This part of the movie is very useful to the bankrupt men and women, failures of the class, and more....
6 Pages (1500 words) Essay

Applied Teaching Methodologies in TESOL Class

This essay "Applied Teaching Methodologies in TESOL class" presents three teaching methodologies to facilitate an effective transfer of knowledge thereby guiding students to be proficient in using English.... This is exactly the rationale why I decided to apply this error identification and correction method in the class to allow students to interact with their fellow learners using a fun game....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us