Friday, August 23, 2019

Electrical computer Engineering Essay Example | Topics and Well Written Essays - 1250 words

Electrical computer Engineering - Essay Example article and give my opinion on possible impact of software technology in smuggling of message in the society today. Moreover, I will research for two other articles that relates to the same technology and provide supplementary information that the article highlights for the same technology. Mazurczyk et al. introduces the article using one of the crimes committed by Russian spies in the United States using computer’s software. However, United States people assumed the Russians to be ordinary US residents but turned out to be spies of Russian Foreign Intelligence Service. Mazurczyk indicated that the spies’ mission was to gather information about the United States policies and programs (2013). Thus, for many years, the spies prevented discovery by hiding secret communication on apparently acquitted pictures posted on public websites. Thus, the spies encoded and decoded the information gathered using personalized software. However, the United States Department of Justice detected the spies’ schemes, helping the United States build a case against Russian spies. Thus, in June 2010, the federal government in United States arrested ten suspected spies who owned up to the act of smuggling information. Therefore, steganography is the technique that openly conceals data by use of invisible ink, shrunken text, and tactically placed tattoos. The method used by Russian spies, termed as picture steganography, was old-fashioned method that was easy to detected and used as evidence. However, the modern method of steganography used of networks, which hides information communicated in seemingly internet traffic. Since network steganography uses short delivery channels like Voice over Internet Protocol, the communications in the program is hard to detect. Mazurczyk indicated that most hackers, journalist, and even government use network steganography to communicate secret information. Although, network steganography is hard to detect, Network Security Group at Warsaw University of Technology focuses to help security experts in devising designs for better guard of steganography. Therefore, as communication technology advances in the world, other steganography experts must develop advanced steganography techniques to curb against information smuggling. Mazurczyk posits that most sophisticated methods today target internet services such as search tools, social network, and file transfer systems (2013). Therefore, quick advancement in technology in today’s society perpetrated increasing smuggling of messages especially through networks. Therefore, smuggling of messages is something that happens daily over computer technological devices especially the internet. Remarkably, network steganography allows information communicated read only by the sender and intended message recipient. Smuggling of messages through internet is on the rise in the society. Terrorists, criminals, hackers, and child pornographers could use steganography to sm uggle information. Thus, this poses a threat to the society. Smuggling of messages through steganography, leads to attacks of a country’s internal security without notice. Generally, steganography has become a threat to a county’s internal security. For instance, the Russian spies who were on a mission in dispatching United States policies and program used to hide information

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.