• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
Viral Computer Warfare Via Activation Engine Employing Steganography

Viral Computer Warfare Via Activation Engine Employing Steganography

Paperback

General Education

Currently unavailable to order

ISBN10: 1249590191
ISBN13: 9781249590194
Publisher: Biblioscholar
Published: Oct 3 2012
Pages: 118
Weight: 0.50
Height: 0.25 Width: 7.44 Depth: 9.69
Language: English
Information warfare is probably the most mysterious, magical, and sophisticated area of study for computer professionals today. Information warfare scientists employ their skills in the use of common electronic mail and the not so common art of steganography in attempts to develop defenses against intrusions and to implement attacks on target systems. To enhance capabilities, steganography is employed and is the art and science of communicating through covert channels. The goal is to hide a message or executable program inside a carrier file such as a photograph in digital form. The growth of attacks in the commercial environment and the possibility of applying those same techniques for military purposes has increased the interest in manipulation of the Internet as a deployment system for cyber-attacks. Electronic mail is currently the most widely exploited practice for the delivery of viruses, Trojan horse programs, or other malicious code. The results of this research indicate that the use of a separate engine followed by an HTML-based electronic mail message containing a photographic image with a steganographically embedded virus or other payload is a vulnerable attack if implemented without the proper environment variables in place. Although successful in delivery of a known virus without detection in the electronic mail reader, it still requires human intervention to initiate the virus attack. Furthermore, the dual stage delivery of the engine, and later the message, allowed for a higher probability of detection at the target system.

1 different editions

Also available

Also in

General Education