软考在线  |  计算机技术与软件专业技术资格(水平)考试   |   [请选择科目]
[ 成为 VIP会员 ]        登录  |  注册      我的  购物车
 
科目切换  联系我们 
    
  |   [请选择科目]

VIP:有效提升20分!  真题  历年真题 (可免费开通)/  百科全书/ 机考模拟平台/  最难真题榜/  自测/  攻打黄金十二宫/  真题检索/  真题下载/  真题词库
知识   必会知识榜/  最难知识榜/  知识点查询/      文档   学习计划/  精华笔记/  试题文档     纸质图书   《百科全书》HOT!!/         /        首页/  2025年上半年专区/  手机版/ 
免费智能真题库 > 历年试卷 > 信息安全工程师 > 2016年下半年 信息安全工程师 上午试卷 综合知识
  第73题      
  章/节:   网络信息安全专业英语       

 
( 71) is the science of hiding information. Whereas .the goal of cryptography is tomake dataulueadable by a third party, the goal of steganography is to hide the data from athirdparty.In this rticle, I will discuss what steganography is; what purposes it seryes, and will provide an example using available software.
There is a large number of steganographic ( 72) that most of us are familiar with (especially if you watch a lot of spy movies !),ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a lage body of text and spreads spectrum radio communication. With computers and networks,there are many other ways of hiding information ,such as:
> Covert channels (e.g.,Loki and some distributed denial-of-service tools use the Internet Control ( 73) Protocol, or ICMP,as the communications channel between the "bad guy" and a compromised system)
> Hidden text within web pages
> Hiding files in "plain sight" (e.g.,what better place to "hide a file than with an important sounding name in the c:\winnt\system32 directory?)
> Null ciphers (e.g., using the first letter of each word to from a hidden message in and otherwise innocuous text)
Steganography today ,however,is significantly more (74 )than the examples above suggest, allowing a user to hide large amounts of infromation within image and audio files.these forms of steganography often are used in conjunction with cryprography so that the information is doubly protected ;first it is encrypted and then hidden so that an adversary has to first find the information (an often difficult task in and of itself ) and then decrypt it.
The simplest approach to hiding data within an image flile is callde ( 75) significant bit insertion in this method we can take the binary representation of the hidden data and overwirit the bit of each byte within the cover image . if we are using 24-bit color the amount of change well be mininmal and indiscerible to the human eye.
 
 
  A.  Member
 
  B.  management
 
  C.   message
 
  D.   Mail
 
 
 确定 并 查看答案解析   我要标记      有奖找茬      上一题        下一题 
 

 
  第74题    2020年下半年  
   48%
Symmetric-key cryptosystems use the (71 ) key for encryption and decryption of a message,though a message or group of me..
  第74题    2017年上半年  
   73%
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends ..
  第75题    2018年上半年  
   79%
Trust is typically interpreted as a subjective belief in the reliability, honesty and security of an entity on which we..
   题号导航      2016年下半年 信息安全工程师 上午试卷 综合知识   本试卷我的完整做题情况  
1 /
2 /
3 /
4 /
5 /
6 /
7 /
8 /
9 /
10 /
11 /
12 /
13 /
14 /
15 /
 
16 /
17 /
18 /
19 /
20 /
21 /
22 /
23 /
24 /
25 /
26 /
27 /
28 /
29 /
30 /
 
31 /
32 /
33 /
34 /
35 /
36 /
37 /
38 /
39 /
40 /
41 /
42 /
43 /
44 /
45 /
 
46 /
47 /
48 /
49 /
50 /
51 /
52 /
53 /
54 /
55 /
56 /
57 /
58 /
59 /
60 /
 
61 /
62 /
63 /
64 /
65 /
66 /
67 /
68 /
69 /
70 /
71 /
72 /
73 /
74 /
75 /
 
第73题    在手机中做本题