Communication Technology. And hacking. How do we communicate and store information in the modern world? How can our communications and data be interrupted, changed, lost or stolen? How can we protect our communications and data?. Why have hacking contests?.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
How do we communicate and store information in the modern world?
How can our communications and data be interrupted, changed, lost or stolen?
How can we protect our communications and data?
Not enough people understand how to protect our important data or how to uncover potentially dangerous information left by others. Computer security is a rapidly growing field.
If you magnify any picture enough you will see the separate dots of color ( pixels) but along with the visible picture is invisible information stores in the same file that tells where, when and with what the picture was taken.
An example showing how terrorists may send hidden messages. This avatar contains the message "Boss said that we should blow up the bridge at midnight." encrypted with mozaiq using "växjö" as password.
There are many different reasons for hacking. Some good, some bad. But you can’t protect a system unless you understand what attacks you need to protect against.