SlideShare a Scribd company logo
1 of 1
Download to read offline
This assessment is designed to assess your technical skills in applying information security tools.
In this
assignment, you are required study and apply steganography techniques to embedded data within
a
file. In addition, you must understand Linux file systems and apply access control technologies.
The
assessment is also assessing your skills to analyses information security principles against
security
techniques including steganography and access control. In completing this assessment
successfully,
you will be able to investigate IS security, risk threats and propose the suitable security controls,
which
will help in achieving ULO-1, ULO-2, ULO-3, and ULO-4.
Task Specifications
This assessment includes three tasks as follows:
Task-1:
Steganography is the practice of concealing a file, message, image, or video within another file,
message, image, or video. Use Steghide tools available in Kali Linux/Linux to hide a text file that
includes your group students IDs on audio file. You have first to create audio file with no more than
30 second to record your group students IDs only. Then, you must generate a text file with group
information, including the first and last names of each student in your group. Finally, use Steghide
tools (with BIS3004 as the passphrase) to embed your text file within the resulting audio file.
In your report, you must include screenshots demonstrating the steps with the commands you
followed during the installation of Steghide, the method used to hide group information text file into
an audio file, and the steps used to extract the text file from the audio file to verify your work.

More Related Content

Similar to This assessment is designed to assess your technical skills .pdf

Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
Choose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfChoose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfaghsports
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET Journal
 
Cyber security
Cyber securityCyber security
Cyber securityEduonix
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
Security Policies
Security PoliciesSecurity Policies
Security Policiesphanleson
 
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10Antti Halla
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) ghayour abbas
 
Process behaviour modelling using lsm
Process behaviour modelling using lsmProcess behaviour modelling using lsm
Process behaviour modelling using lsmiaemedu
 

Similar to This assessment is designed to assess your technical skills .pdf (20)

Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
smpef
smpefsmpef
smpef
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
Choose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdfChoose your own project idea or select one of the following.pdf
Choose your own project idea or select one of the following.pdf
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Multimedia
MultimediaMultimedia
Multimedia
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
 
Cyber security
Cyber securityCyber security
Cyber security
 
information security management
information security managementinformation security management
information security management
 
Typo3 Security Team
Typo3 Security TeamTypo3 Security Team
Typo3 Security Team
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
 
systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10systems-approach-security_masters-thesis_Halla_2016-08-10
systems-approach-security_masters-thesis_Halla_2016-08-10
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Process behaviour modelling using lsm
Process behaviour modelling using lsmProcess behaviour modelling using lsm
Process behaviour modelling using lsm
 

More from adislifestyle

Theory of Planetary System Formation The mass of the presol.pdf
Theory of Planetary System Formation The mass of the presol.pdfTheory of Planetary System Formation The mass of the presol.pdf
Theory of Planetary System Formation The mass of the presol.pdfadislifestyle
 
The Weibull distribution has probability density function f.pdf
The Weibull distribution has probability density function f.pdfThe Weibull distribution has probability density function f.pdf
The Weibull distribution has probability density function f.pdfadislifestyle
 
The WD40 Company has been presented with an investment oppor.pdf
The WD40 Company has been presented with an investment oppor.pdfThe WD40 Company has been presented with an investment oppor.pdf
The WD40 Company has been presented with an investment oppor.pdfadislifestyle
 
The world Bank records the prevalence of HIV in countries ar.pdf
The world Bank records the prevalence of HIV in countries ar.pdfThe world Bank records the prevalence of HIV in countries ar.pdf
The world Bank records the prevalence of HIV in countries ar.pdfadislifestyle
 
The waiting times between a subway departure schedule and th.pdf
The waiting times between a subway departure schedule and th.pdfThe waiting times between a subway departure schedule and th.pdf
The waiting times between a subway departure schedule and th.pdfadislifestyle
 
theme 6 hygiene and ecology answer all questions Theme N6 .pdf
theme 6 hygiene and ecology answer all questions  Theme N6 .pdftheme 6 hygiene and ecology answer all questions  Theme N6 .pdf
theme 6 hygiene and ecology answer all questions Theme N6 .pdfadislifestyle
 
there is no more info for this question other than what is p.pdf
there is no more info for this question other than what is p.pdfthere is no more info for this question other than what is p.pdf
there is no more info for this question other than what is p.pdfadislifestyle
 
This image shows an internal view of the kidneys What is th.pdf
This image shows an internal view of the kidneys What is th.pdfThis image shows an internal view of the kidneys What is th.pdf
This image shows an internal view of the kidneys What is th.pdfadislifestyle
 
This face recognition attendance system code for face recogn.pdf
This face recognition attendance system code for face recogn.pdfThis face recognition attendance system code for face recogn.pdf
This face recognition attendance system code for face recogn.pdfadislifestyle
 
This exercise involves the use of an unrealistically small p.pdf
This exercise involves the use of an unrealistically small p.pdfThis exercise involves the use of an unrealistically small p.pdf
This exercise involves the use of an unrealistically small p.pdfadislifestyle
 
This includes South African platforms for crypto assets br.pdf
This includes South African platforms for crypto assets br.pdfThis includes South African platforms for crypto assets br.pdf
This includes South African platforms for crypto assets br.pdfadislifestyle
 
This exercise is to be discussed in class Prepare an Emer.pdf
This exercise is to be discussed in class  Prepare an Emer.pdfThis exercise is to be discussed in class  Prepare an Emer.pdf
This exercise is to be discussed in class Prepare an Emer.pdfadislifestyle
 
This exercise is based on Laraba Imane et al Pseudoflow.pdf
This exercise is based on Laraba Imane et al Pseudoflow.pdfThis exercise is based on Laraba Imane et al Pseudoflow.pdf
This exercise is based on Laraba Imane et al Pseudoflow.pdfadislifestyle
 
This discussion has four parts In your own words and in no .pdf
This discussion has four parts In your own words and in no .pdfThis discussion has four parts In your own words and in no .pdf
This discussion has four parts In your own words and in no .pdfadislifestyle
 
This diagram shows that water is added to the aquiter by pre.pdf
This diagram shows that water is added to the aquiter by pre.pdfThis diagram shows that water is added to the aquiter by pre.pdf
This diagram shows that water is added to the aquiter by pre.pdfadislifestyle
 
This data is from a sample Calculate the mean standard dev.pdf
This data is from a sample Calculate the mean standard dev.pdfThis data is from a sample Calculate the mean standard dev.pdf
This data is from a sample Calculate the mean standard dev.pdfadislifestyle
 
This discussion requires some significant research on your p.pdf
This discussion requires some significant research on your p.pdfThis discussion requires some significant research on your p.pdf
This discussion requires some significant research on your p.pdfadislifestyle
 
This code works only for palindrome If NOT a palindrome the.pdf
This code works only for palindrome If NOT a palindrome the.pdfThis code works only for palindrome If NOT a palindrome the.pdf
This code works only for palindrome If NOT a palindrome the.pdfadislifestyle
 
This assignment uses a rubric of 200 points It focuses on O.pdf
This assignment uses a rubric of 200 points It focuses on O.pdfThis assignment uses a rubric of 200 points It focuses on O.pdf
This assignment uses a rubric of 200 points It focuses on O.pdfadislifestyle
 
This assignment will have two circuits A main circuit that .pdf
This assignment will have two circuits A main circuit that .pdfThis assignment will have two circuits A main circuit that .pdf
This assignment will have two circuits A main circuit that .pdfadislifestyle
 

More from adislifestyle (20)

Theory of Planetary System Formation The mass of the presol.pdf
Theory of Planetary System Formation The mass of the presol.pdfTheory of Planetary System Formation The mass of the presol.pdf
Theory of Planetary System Formation The mass of the presol.pdf
 
The Weibull distribution has probability density function f.pdf
The Weibull distribution has probability density function f.pdfThe Weibull distribution has probability density function f.pdf
The Weibull distribution has probability density function f.pdf
 
The WD40 Company has been presented with an investment oppor.pdf
The WD40 Company has been presented with an investment oppor.pdfThe WD40 Company has been presented with an investment oppor.pdf
The WD40 Company has been presented with an investment oppor.pdf
 
The world Bank records the prevalence of HIV in countries ar.pdf
The world Bank records the prevalence of HIV in countries ar.pdfThe world Bank records the prevalence of HIV in countries ar.pdf
The world Bank records the prevalence of HIV in countries ar.pdf
 
The waiting times between a subway departure schedule and th.pdf
The waiting times between a subway departure schedule and th.pdfThe waiting times between a subway departure schedule and th.pdf
The waiting times between a subway departure schedule and th.pdf
 
theme 6 hygiene and ecology answer all questions Theme N6 .pdf
theme 6 hygiene and ecology answer all questions  Theme N6 .pdftheme 6 hygiene and ecology answer all questions  Theme N6 .pdf
theme 6 hygiene and ecology answer all questions Theme N6 .pdf
 
there is no more info for this question other than what is p.pdf
there is no more info for this question other than what is p.pdfthere is no more info for this question other than what is p.pdf
there is no more info for this question other than what is p.pdf
 
This image shows an internal view of the kidneys What is th.pdf
This image shows an internal view of the kidneys What is th.pdfThis image shows an internal view of the kidneys What is th.pdf
This image shows an internal view of the kidneys What is th.pdf
 
This face recognition attendance system code for face recogn.pdf
This face recognition attendance system code for face recogn.pdfThis face recognition attendance system code for face recogn.pdf
This face recognition attendance system code for face recogn.pdf
 
This exercise involves the use of an unrealistically small p.pdf
This exercise involves the use of an unrealistically small p.pdfThis exercise involves the use of an unrealistically small p.pdf
This exercise involves the use of an unrealistically small p.pdf
 
This includes South African platforms for crypto assets br.pdf
This includes South African platforms for crypto assets br.pdfThis includes South African platforms for crypto assets br.pdf
This includes South African platforms for crypto assets br.pdf
 
This exercise is to be discussed in class Prepare an Emer.pdf
This exercise is to be discussed in class  Prepare an Emer.pdfThis exercise is to be discussed in class  Prepare an Emer.pdf
This exercise is to be discussed in class Prepare an Emer.pdf
 
This exercise is based on Laraba Imane et al Pseudoflow.pdf
This exercise is based on Laraba Imane et al Pseudoflow.pdfThis exercise is based on Laraba Imane et al Pseudoflow.pdf
This exercise is based on Laraba Imane et al Pseudoflow.pdf
 
This discussion has four parts In your own words and in no .pdf
This discussion has four parts In your own words and in no .pdfThis discussion has four parts In your own words and in no .pdf
This discussion has four parts In your own words and in no .pdf
 
This diagram shows that water is added to the aquiter by pre.pdf
This diagram shows that water is added to the aquiter by pre.pdfThis diagram shows that water is added to the aquiter by pre.pdf
This diagram shows that water is added to the aquiter by pre.pdf
 
This data is from a sample Calculate the mean standard dev.pdf
This data is from a sample Calculate the mean standard dev.pdfThis data is from a sample Calculate the mean standard dev.pdf
This data is from a sample Calculate the mean standard dev.pdf
 
This discussion requires some significant research on your p.pdf
This discussion requires some significant research on your p.pdfThis discussion requires some significant research on your p.pdf
This discussion requires some significant research on your p.pdf
 
This code works only for palindrome If NOT a palindrome the.pdf
This code works only for palindrome If NOT a palindrome the.pdfThis code works only for palindrome If NOT a palindrome the.pdf
This code works only for palindrome If NOT a palindrome the.pdf
 
This assignment uses a rubric of 200 points It focuses on O.pdf
This assignment uses a rubric of 200 points It focuses on O.pdfThis assignment uses a rubric of 200 points It focuses on O.pdf
This assignment uses a rubric of 200 points It focuses on O.pdf
 
This assignment will have two circuits A main circuit that .pdf
This assignment will have two circuits A main circuit that .pdfThis assignment will have two circuits A main circuit that .pdf
This assignment will have two circuits A main circuit that .pdf
 

Recently uploaded

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 

Recently uploaded (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 

This assessment is designed to assess your technical skills .pdf

  • 1. This assessment is designed to assess your technical skills in applying information security tools. In this assignment, you are required study and apply steganography techniques to embedded data within a file. In addition, you must understand Linux file systems and apply access control technologies. The assessment is also assessing your skills to analyses information security principles against security techniques including steganography and access control. In completing this assessment successfully, you will be able to investigate IS security, risk threats and propose the suitable security controls, which will help in achieving ULO-1, ULO-2, ULO-3, and ULO-4. Task Specifications This assessment includes three tasks as follows: Task-1: Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Use Steghide tools available in Kali Linux/Linux to hide a text file that includes your group students IDs on audio file. You have first to create audio file with no more than 30 second to record your group students IDs only. Then, you must generate a text file with group information, including the first and last names of each student in your group. Finally, use Steghide tools (with BIS3004 as the passphrase) to embed your text file within the resulting audio file. In your report, you must include screenshots demonstrating the steps with the commands you followed during the installation of Steghide, the method used to hide group information text file into an audio file, and the steps used to extract the text file from the audio file to verify your work.