study and apply steganography techniques

7:494 • Search
< BIS3004 Assessment Br…
3

This assessment is designed to assess your technical skills in applying information security tools. In this assignment, you have to study and apply steganography techniques to embedded data within a file. In addition, you have to understand Linux file systems and apply access control technologies. The assessment is also assessing your skills to analyses information security principles against security techniques including steganography and access control. In completing this assessment successfully, you will be able to investigate IS security, risk threats and propose the suitable security controls, which will help in achieving ULO-1, ULO-2, ULO-3, and ULO-4.
Task Specifications This assessment includes three tasks as follows:
Task-1: Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Use Steghide tools available in Kali Linux/Linux to hide a text file that
“” •.■ Phon0 .61 3%035 33
APIC co,,…
includes your group students IDs on audio file. You have first to create audio file with no more than 30 second to record your group students IDs only. Then, you have to create text file to include group details include first and last name for each student in your group. Finally, use Steghide tools (use security as passphrase) to embedded your text file into the created audio file. In your report, you have to provide screenshot demonstrate the steps with the commands you followed during the process of installation of Steghide, and the way use used to hide group information text file into audio file and finally the steps to extract the text file from audio for verification of your work.
Task-2: Access control is granting or denying approval to use specific resources. Technical access control consists of technology restrictions that limit users on computers from accessing data. In this task you have to work in a group to understand Access Control List (ACL) and files system security using Linux environment. You have to complete the followings tasks using kali Linux or any Linux OS:
1. Fill the following table with the information related to all member of your group:
Ste. No APIC Student ID First Name Last Name 1 (Student-ID1) (FirstName-1) (LastName-1) 2 3
Table 1: Group information
2. Create main directory named 0153004 and set it permission to full access, fill the following table:
Task
Command/s
Create directory named :0153004
Set full access to 0153004 directory
Table 2: Creote Directories APIC
3. Create sub directories within BIS3004 directo y according to Table-3:
Task Command/s – Create directory {FirstName-1} – Set read and write access permission only – Create directory {FirstName-2} – Set read access permission only – Create directory {FirstName-3} – Set read and execute access permission only
Table 3: Create Student ID directories
ci r2) Dashboard Calendar To Do Notifications Inbox

GET HELP WITH YOUR HOMEWORK PAPERS @ 25% OFF

For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

Write My Paper Button

WeCreativez WhatsApp Support
We are here to answer your questions. Ask us anything!
👋 Hi, how can I help?
Scroll to Top