Network Security Illustrated buy the book at Amazon now!


search site
Table of Contents

Book
Introduction

Managing
Security

Outsourcing
Options

Reserving
Rights

Determining
Identity

Preserving
Privacy

Connecting
Networks

Hardening
Networks

Storing
Information

Hiding
Information

Accessing
Information

Ensuring
Availability

Detecting
Intrusions

Page Tools
print this pagePrint this Page
Hiding
Information
Chapter List
Cryptography
Cryptanalysis
Steganography
More Information
Resources (links)
Discussions
FAQs
Errata
Sample Pages
Buy The Book
at amazon.com

Summary

A handful of techniques for keeping critical information away from wandering eyes are available, such as cryptography and steganography. Not only can these methods aid in privacy (if used correctly), but they also continue to protect information even if the data has been intercepted or stolen.

Key Points

  • Hiding something effectively is difficult.
  • You can hide information by covering it up (obfuscation), disguising it (steganography), or putting it somewhere safe (cryptography).
  • You can’t use something that’s hidden. It is not possible to effectively hide something you need to access frequently.
  • No matter how well something is hidden, its location can be revealed when the hider accesses the item. So, the better hidden something is, the less convenient it is to access. Hiding something very well might be better for peace of mind than it is for practical security.

Connections

The most effective method for hiding information is cryptography. It’s also possible to hide information in more subtle ways, such as with steganography. When Steganography is combined with cryptography, the result is an extremely powerful data hiding technique. The following chapters explore how digital data is hidden, and how it can be found:

  • Cryptography explores the science and art of scrambling messages to keep the contents secret.

  • Cryptanalysis covers the science and art of code breaking.

  • Steganography looks at techniques for effectively hiding one piece of information.

More Information

The above information is an excerpt from "Network Security Illustrated," published by McGraw-Hill and available from amazon.com, as well as your local bookstore. The book goes into much greater depth on this topic. To learn more about the book and what it covers, click here.

Below, you'll find links to online resources that supplement this portion of the book.


Resources

(websites, books, etc.)

Discussions

FAQs

Errata

Sample Pages