Steganography

Cards (7)

  • Steganography
    The practice of concealing information within another message or physical object to avoid detection
  • Steganography
    • Can be used to hide virtually any type of digital content such as text, image, video, audio
    • The hidden data is extracted at its destination
  • Steganography
    The practice of hiding message, image or file within another message, image, file<|>This technique is used to conceal the existence of the hidden data from those who are not intended to see it<|>Making it difficult for unauthorized person to detect it
  • The employee could send the information unencrypted/unhidden directly via email, file-sharing service or USB drives. However, this method is risky because it can be easily detected by security systems monitoring for unauthorized data transfers.
  • DLP tools can scan outgoing communications for sensitive data patterns and block or alert these transmissions.
  • Email Headers and Metadata can identify the sender and other details about the transmission.
  • Why use steganography
    • Concealment - Hide information within ordinary files such as images, audio or video making it less likely to raise suspicion
    • Avoid Detection - Hidden data is embedded within another file, avoiding detection by keyword-based monitoring systems
    • Difficulty In Tracing - Detecting steganography often requires specialized tools and expertise, making it harder for security teams to identify and trace the hidden data