Главная
Study mode:
on
1
Introduction
2
Encryption
3
Hashing
4
Encoding
5
Exclusive
6
Probability analysis
7
Tunneling
8
Cover Channels
9
Data Hiding
10
File Allocation Table
11
File Naming
12
File Signatures
13
Summary
Description:
Learn about data hiding and obfuscation techniques in this 42-minute lecture from Prof Bill Buchanan OBE's "Introduction to Security and Network Forensics" book. Explore encryption, hashing, encoding, and exclusive methods for concealing information. Delve into probability analysis, tunneling, cover channels, and various data hiding techniques including file allocation table manipulation, file naming strategies, and file signature alterations. Gain valuable insights into network security and digital forensics as part of the Advanced Security and Digital Forensics module at Edinburgh Napier University.

Data Hiding and Obfuscation in Security and Network Forensics - Lecture 10

Bill Buchanan OBE
Add to list