Sunday, June 9, 2019
Electrical computer Engineering Essay Example | Topics and Well Written Essays - 1250 words
Electrical estimator Engineering - Essay Examplearticle and give my opinion on assertable impact of software engineering science in smuggling of subject in the society today. Moreover, I will research for two other articles that relates to the same engineering science and provide supplementary information that the article highlights for the same technology. Mazurczyk et al. introduces the article using one of the crimes committed by Russian spies in the united States using computers software. However, United States people assumed the Russians to be ordinary US residents but turned out to be spies of Russian Foreign Intelligence Service. Mazurczyk indicated that the spies representation was to gather information about the United States policies and programs (2013). Thus, for many years, the spies prevented discovery by hiding secret communication on apparently acquitted pictures posted on public websites. Thus, the spies encoded and decoded the information gathered using person alized software. However, the United States Department of Justice detect the spies schemes, helping the United States build a case against Russian spies. Thus, in June 2010, the federal government in United States arrested ten suspected spies who owned up to the act of smuggling information. Therefore, steganography is the technique that openly conceals data by use of invisible ink, shrunken text, and tactically placed tattoos. The method used by Russian spies, termed as picture steganography, was old-fashioned method that was easy to detected and used as evidence. However, the modern method of steganography used of networks, which hides information communicated in seemingly internet traffic. Since network steganography uses short delivery channels like articulate over Internet Protocol, the communications in the program is awkward to detect. Mazurczyk indicated that most hackers, journalist, and even government use network steganography to communicate secret information. Although , network steganography is hard to detect, Network Security Group at Warsaw University of Technology focuses to help security experts in devising designs for better guard of steganography. Therefore, as communication technology advances in the world, other steganography experts must develop advanced steganography techniques to curb against information smuggling. Mazurczyk posits that most sophisticated methods today target internet services such as search tools, social network, and file transfer systems (2013). Therefore, quick advancement in technology in todays society perpetrated increasing smuggling of messages peculiarly through networks. Therefore, smuggling of messages is something that happens daily over computer technological devices especially the internet. Remarkably, network steganography allows information communicated read only by the sender and intended message recipient. Smuggling of messages through internet is on the rise in the society. Terrorists, criminals, hac kers, and child pornographers could use steganography to smuggle information. Thus, this poses a threat to the society. Smuggling of messages through steganography, leads to attacks of a democracys internal security without notice. Generally, steganography has become a threat to a countys internal security. For instance, the Russian spies who were on a mission in dispatching United States policies and program used to hide information
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.