Data Hiding Students’ Name Institutional Affiliation Use of ADS to hide data and other destructive uses Alternate data streams are used in data hiding owing to their nature of maintaining the format of files accessed by the person who does not want to be tracked. File details for instance the title and dates edited are kept in Master File Table the MFT. This can keep both the residential and the non-residential aspects of files in the disks. Data streams can therefore be kept outside the known boundaries by the use of pointers to locate data hiding tools is done through visual analysis and pattern studies. Disk method is used to observe and iron out abnormal patterns in files such as images. References Berghel H. & Brajkovska N. (2004). Wading into alternate data streams. Communications of the ACM 47(4) 21-27. Katzenbeisser S. & Petitcolas F. (2000). Information hiding techniques for steganography and digital watermarking. Artech house. Yang C. H. Weng C. Y. Wang S. J. & Sun H. M. (2008). Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security 3(3) 488-497. [...]
Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.