Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,
Advertisements

Information Hiding: Watermarking and Steganography
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
What is forensic science?
Pictures Worth More Than 1000 Words
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Introduction to Computer Forensics for Non-Majors Yana Kortsarts, Computer Science William Harver, Criminal Justice Widener University.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
A Steganography Project Project By: Awadesh Madhogaria.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
Steganography.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Anonymity, Security, Privacy and Civil Liberties
Information Security Principles (ESGD4222)
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Digital Steganography
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Master and PhD examples Prof. Yvo Desmedt Department of Computer Science Florida State University, USA Partially funded by NSF.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CJA 324 Week 3 Learning Team Ethics Issue Presentation Law Enforcement Ethics To purchase this material click
Introduction to Information Security Introduction & Overview
College of Adult & Professional Studies Criminal Justice Program
PowerPoint® Slides to Accompany
Cryptography And Network Security
PowerPoint® Slides to Accompany
Introduction to Computer Forensics
Applications of Cryptography
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Information and Network Security
Steganography.
Steganography & Digital Watermarfking
Chapter 3:Cryptography (16M)
Visit for more Learning Resources
PowerPoint® Slides to Accompany
Encryption, Cryptography, and Steganography:
Unit4- Basic Video Segment Production
HIDING IN PLAIN SIGHT A QUICK INTRO TO STEGANOGRAPHY
Vocabulary 13 1.documentation -
“Hiding in Plain Sight”
Computer Security Chapter Two
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8

Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication--to hide the existence of a message from a third party. Computer forensics is the science of retrieving digital information for the purposes of law enforcement. Terms

Relationship Steganography: Cryptology hidden in plain sight. Computer forensics can involve defeating cryptology and steganography.

Ethical Issues Computer Forensics: Used in law enforcement, but also by criminals. Cryptography: Can be used to protect privacy, but also by criminals. Steganography: Used to help detect piracy, but can also be used by criminals.

Works Cited secret-messages-on-public-websites/ Ethics in Information Technology, George Reynolds india-officials-want-lift-blackberrys-cloak-encryption.htm

2-3 Questions: 1. What is the difference between cryptography and Steganography? 2. Give a current event involving ethical issues with steganography and or cryptography. 3. Which is superior, steganography or cryptography?