Question 1) Using your own words explain what a Privacy-invasive software is. Provide one example of a privacy-invasive software and describe how it is malicious. Question 2) Why would steganography be of interest to the information security professional? Provide specific examples.

Type of service: Writing from scratch
Work type: Coursework
Deadline: 28 Oct, 4:29 PM 

Academic level:Master’s
Subject or discipline:IT, Web
Title:Information System Security
Number of sources:1
Provide digital sources used:No
Paper format:APA
# of pages:1
Spacing:Double spaced
# of words:275
# of slides:ppt icon 0
# of charts:0

Paper details:Please answer the questions that I attached perfectly, and response for the student answer that I also attached.
Note: I attached eBook, please try to match the answer with it

Information System Security

Student’s Name

Institutional Affiliation

Information System Security Assignment

Privacy-invasive software (PIS)

These are computer software, which ignores the privacy of the user. Commercial intentions are the reasons behind distributing the programs. PIS secretly collects privacy-invasive information, present unwelcomed contents or secretly exchange requested contents with some other information. PIS sneak into the system and hide inside the core beyond access by the user.

The typical example of PIS is adware, which displays or downloads unwanted ads whenever the user is online. This behavior is malicious, as the program does not request the user’s consent.

Stagonatography

Stagonatography, according to Whitman, M. E., & Mattord, H. J. (2011),  is the practice of concealing a message, video, image, or a file within another a message, video, image, or file. Its importance to information security professional is that steganography helps to hide the message within a digital encoding of a graphic or picture to provide confidentiality. For example, in image storage, a pixel with a red intensity of 0101001 and another of 00101000 have no difference to the necked eyes. However, a steganographer uses the small distinction to achieve one bit per color to encode data into an image file.

Virus, worm and Trojan Horse.

According to the student’s answer, the only general similarity among the three is that all of them are malicious programs able to damage a computer. However, worm is a virus that can travel without human action and can replicate itself, unlike virus and Trojan. They breach security of the system by acting on private files without the user knowledge although virus, unlike Trojan spreads only when the user acts upon them.

Reference

Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Cengage Learning.

Leave a Comment

× Chat