CYS 663 Digital forensics
During this module, you explored techniques for hiding and scrambling information. Archived/temp data are a reliable source of e-evidence.
- Identify at least two motivations for using steganography. Should all who use steganography be considered subversive or a danger to society?
- Identify at least two ways in which steganography complicates forensic investigations and explain why.
- Support your viewpoint using sources from the Internet, your textbook, or the Saudi Digital Library.
In preparing your response, include at least one source from professional or academic literature—such as articles from peer-reviewed journals and relevant textbooks. For this course, Wikipedia is not considered an academic or professional reference. Also, proofread and spell check your responses. All sources should be formatted using APA guidelines.
You are required to reply to at least two peer discussion question post answers to this weekly discussion question and/or your instructor’s response to your posting. These post replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that post’s answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.