Question

In: Computer Science

What would be a good Topic for a Dissertation in Cyber Security in 2020 Create a...

What would be a good Topic for a Dissertation in Cyber Security in 2020

Create a 750-word document that includes the following:

An opening paragraph introducing the topic and the reasons why you chose the topic.

A summary of each of the articles you used that provide support for further research on the topic you chose. Include in the summary information on why the article supports further research. Each summary should be approximately 100 words in length.

A concluding paragraph that summarises the need for further research in your chosen topic.

Solutions

Expert Solution

Step(1)

Ok I go with a Steganography, i think it is Very Hot topics in the field Of Cyber Security and Lot's of Research Work are already going on But Still There are Lot's of thing to explore.

Step(2)

Introduction

In today's information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raise concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information.

Steganography combined with encryption will be a powerful and efficient tool that provides high level of security.

A review on steganography research and development throughout the year will be discussed in part 2 of this paper. The review will be focusing on Muslim world and narrowing it down to Middle East countries. The review includes past, current and future research on steganography and the possible future research on the latest algorithm and technologies in steganography.

Step(3)

Steganography History

The word Steganography comes from the Greek origin that means “concealed (covered) writing”. The word steganos means “covered or protected” and graphie means “writing”. Steganography thus not only emphasize on the art of hiding information but also the art and science of hiding the communication that take place. First applications of Steganography were documented by Herodotus, a Greek historian. Steganography can be traced back to ancient Greek centuries when the message is tattooed on the messengers shaved heads. The hair then grows to hide the message. Their head will be shaved when they reach the recipient of the message.Another steganography method that was used during those days is tablet wax. In order to hide the message, the tablet was erased by wax and text was etched on and then again covered it by wax and appeared blank upon inspections.

During the century, the methods of using invisible inks were extremely popular. During the World War II where people used ink for writing hidden messages, this was true . The mixture will turn darker and the written message becomes visible upon heating. After some time, the Germans introduced the microdot technique where microdots are considered as photographs as small as a printed period, but with a clear format of a typewritten page. They were included in a letter or an envelope, and because of their tiny sizes, they could be indiscernible. Microdots were also hidden in body parts including nostrils, ears, or under fingernails.The military and several governmental agencies are looking into steganography for their own secrettransmissions of information. They are also desirous of discerning secret information communicated by criminals, terrorists, and other aggressive forces. Following investigations into the Al‑ Qaeda attack, steganography was suspected to be made use of in their attack of the World Trade Centre.

Step(4)


  Steganography Features And Application

Steganography can be used in a lot of useful applications. For example copyright control of materials, to enhance the robustness of an image search engines and smart identity cards where the details of individuals are embedded in their photographs. Other applications include video-audio synchronization, TV broadcasting, TCP/IP packets where a unique ID is embedded in an image to analyse the network traffic of particular users. Medical Imaging Systems is one of the modern applications that use Steganography where a separation is recommended between patients‟ image data or DNA sequences and their captions for security or confidentiality reasons. Thus, embedding the patient‟s information in the image could be a security measure to help solving security issues .Digital technologies have swept the confidence in the integrity of visual imagery; a matter that motivated researchers to conduct research on digital document forensics. In 2009, Cheddad and his colleagues propose a steganographic scheme which protects scanned documents from forgery using self-embedding techniques. It also allows legal or forensics experts to access the original document though it is manipulated.

Step(5)

  The Difference Between Cryptography and Steganography

Users on the internet have to send, share or receive confidential data most of the time [26]. With the
increasing number of users and the increasing number of unauthorized access of confidential data, information
security played an important role. Therefore, the main issue now is to mitigate and to lessen the impact of the
chances of the information being detected during transmission. Cryptography deals message encryption but the
communication is easily aroused suspicious but on the other hand, steganography deals with secret message
hiding but the communication is invisible. This is the major differences between cryptography and
steganography.
It is often thought that by encrypting the traffic, the communications will be secured but this has not been adequate in real live situation. In cryptography method, people become aware of the existence of information by observing coded information, although they are unable to comprehend the information. Steganography hides the existence of the message so that intruders can‟t detect the communication and thus provides a higher level of security than cryptography. Both steganographic and cryptographic systems provide secret communications but different in terms of system breaking. If the intruder can read the message in cryptographic then it is broken but steganographic is considered broken once the intruders detect the existence of the secret message.  Steganography system is more fragile than cryptography systems in terms of system
failure. This is because if the communication is detected even without decoding the message, a steganographic
system is considered a failure.

Step(6)

Future Work

As steganography continue on its evolutionary path, the world of information security looks forward in the
future research regarding the field of steganography as modern encryption algorithms are broken. Some of the
future researches include:

1. Steganalysis that is defined as a process to crack the cover object in order to get the hidden information.

2. Combining the technology of cryptography with steganography to achieve a higher level of f security that even the intruder detects the hidden message, the message cannot be decoded.

3. Researchers continue to discover new platforms that could potentially use to hide information apart from the traditional platforms such as audio, video and images.

4. The concept of using DNA computing in the fields of cryptography and steganography has been identified as a possible technology for unbreakable algorithms.

Step(7)

Conclusion

As per conclusion, this paper discussed an overview of Steganography, the features and applications, history and how it's differs from cryptography. and  also highlighted a review of research and development of Steganography in world from the year 2010 to 2020. and also suggested a few for future research like Steganalysis, technology combined, discover new platform and possible unbreakable algorithms.


Related Solutions

(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the differences with the help of appropriate examples. Please provide your own words. No copy from the internet. 150 to 200 words.
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how...
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. Compose an organizational security policy that protects the confidentiality , integrity , and availability of EQUIFAX DATA BREACH IN 2017 Original Question : Prompt: You will submit your creation of a cyber-security...
Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are...
Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are your thoughts about this security breach?
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least...
This is for CYBER SECURITY 1)What are the 3 factors of Authentication and provide at least 3 examples for each? 2) Please compare and contrast the following 4 Access Control Models and let me know how they work and give me an example of each. 1. Discretionary Access Control 2. Mandatory Access Control 3. Rule Based Access Controls 4. Role Based Access Controls
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial encryption algorithms. Find one that you feel may be “snake oil”. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber...
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber threat landscape. Yet the market for cyber security remains small, and organizations are making only tactical investments in cyber security measures—one of the reasons why there has been an increase in cyber-attacks. Evidence suggests that this trend will last for some time to come. However, the anticipation of an increasingly open and mobile enterprise should help refocus the spotlight on strategic investments in areas...
Discuss Cyber Security as it relates to the role of the US government. Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.
(a) – Discuss Cyber Security as it relates to the role of the US government. (b)– Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.  
Cyber security Security Policy: , write a small antivirus policy for the IT infrastructure and users...
Cyber security Security Policy: , write a small antivirus policy for the IT infrastructure and users in a small business an elementary school You may research anti-virus policies of organizations on the web, please use and cite responsibly. Security Recommendation: Rose Shumba manages the IT security for a school. Given the wide range of people who use the school’s computers, it is challenging for Rose to prevent virus infections. She has installed an anti-virus on each machine and has a...
A dissertation proposal of about 500 words on this topic: Operations Management (Evaluation and analysis of...
A dissertation proposal of about 500 words on this topic: Operations Management (Evaluation and analysis of tools and models applied in operations management and its contribution to achieving a green supply chain 1. Explanation on the proposed title. 2. Research questions 3. Research methodology to be applied
A dissertation proposal of about 500 words on this topic: Operations Management (Evaluation and analysis of...
A dissertation proposal of about 500 words on this topic: Operations Management (Evaluation and analysis of tools and models applied in operations management and its contribution to achieving a green supply chain
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT