https://www.youtube.com/watch?v=dHrSfCH8ejI
watch the video then answer the question below
think about what you learned, and then in this Discussion area (2020 Tableau Conference), give a quick summary of what the presentation was about, and discuss the top 3 things you learned.
Please take a look at the attached PDF. The steganography that they are talking about is not simply about how blockchain encrypt the data, but about how people can "make use" of blockchain and embed data inside the block. In their research, they embed an integer in the block for the receiver to extract it later and get the secret integer inside.
I would like something similar with that - embedding data (any data, even just an integer) during the process of ECDSA signature secretly, and for the receiver to get the secret data that was hidden inside that. I don't need a very specific algorithm. I just need a possible idea that might work, for example, in which process I can embed the data, where to embed the data ( r, s, v?)
following the flamework -
1) Why is it important?
2) optional - Is there any background information? (for people to understand the upcoming proposal)
3) What suboptimal process are you trying to improve? How have problems similar to this been s
Hello its me.
Please take a look at the attached PDF. The steganography that they are talking about is not simply about how blockchain encrypt the data, but about how people can "make use" of blockchain and embed data inside the block. In their research, they embed an integer in the block for the receiver to extract it later and get the secret integer inside.
I would like something similar with that - embedding data (any data, even just an integer) during the process of ECDSA signature secretly, and for the receiver to get the secret data that was hidden inside that. I don't need a very specific algorithm. I just need a possible idea that might work, for example, in which process I can embed the data, where to embed the data ( r, s, v?)
following the flamework -
1) Why is it important?
2) optional - Is there any background information? (for people to understand the upcoming proposal)
3) What suboptimal process are you trying to improve? How have problem
Instructions
Prepare a two-page case study that addresses the following components. Be sure to provide headings for Part I, Part II, Summary, and References.
Part I
You have been tasked with recommending environmental and physical controls for a new data center to be built at your school. You are expected to present a report to the chief information officer. Part I of your case study should be a synopsis of the importance of data center physical and environmental security.
Part II
Part II of your case study should address three areas: location, perimeter security, and power.
Location recommendations should include where the data center should be built and a description of the security of the surrounding area (for example, location-based threats including political stability, susceptibility to terrorism, the crime rate, adjacent buildings, roadways, pedestrian traffic, flight paths, utility stability, and vulnerability to natural disasters).
Access control recommend
Instructions
Prepare a two-page case study that addresses the following components. Be sure to provide headings for Part I, Part II, Summary, and References.
Part I
You have been tasked with recommending environmental and physical controls for a new data center to be built at your school. You are expected to present a report to the chief information officer. Part I of your case study should be a synopsis of the importance of data center physical and environmental security.
Part II
Part II of your case study should address three areas: location, perimeter security, and power.
Location recommendations should include where the data center should be built and a description of the security of the surrounding area (for example, location-based threats including political stability, susceptibility to terrorism, the crime rate, adjacent buildings, roadways, pedestrian traffic, flight paths, utility stability, and vulnerability to natural disasters).
Access control recommend
You can argue to support, oppose, or amend the law. Any statements should be backed up with logic and/or evidence to support your point, it should not just be an assertion.
Demonstrate understanding of the proposed laws provisions and its likely impact on stakeholders
Demonstrate understanding of the proposed law's likely impact on cybersecurity
The format for your week 3 discussion is a Talking Points Paper. Talking points help decision-makers/leaders/managers make decisions. Decision-makers use talking points instead of (or in addition to) reading lengthy reports because the talking points only include the pertinent facts and/or the bottom line - meaning each talking point stands alone in the context of the paper topic.
Prepare a set of talking points (3 to 5 paragraphs or 5 categories / 20-25 bullet points total) that address the following information request:
How does FedRAMP help agencies ensure the security of digital government services?
Your talking points must address the following:
What is meant by "Digital Government services?" (previously called "e-Government" services)
FedRAMP (what it is, how agencies use FedRAMP to deliver Digital Services, and how FedRAMP contributes to improved security for Digital Services)
Additional strategies for improving privacy and security (Play #11) f
You will research an area related to computer forensics. Find a professional article on the topic, and write a 750-1000 word essay in which you summarize the article in detail and explain its relevance to computer forensics. For maximum credit, your essay should also include references to additional reputable sources which could be articles, papers, blog postings, etc. Please use MLA format in your references and citations.
The below rubric is what is asked to be followed during the completion of the paper:
Introduction or Overview of Digital Government
Provided an excellent introduction or overview of digital government which provided definitions and addressed the laws, regulations, and policies which require that federal agencies provide information and services via the Web. The overview appropriately used information from 3 or more authoritative sources.
Review of Digital Government Websites
Provided an excellent overview of the information and services provided by three or more digital government Websites. Provided full, complete, and concise answers to the following questions:
a. What types of information or services are available via the selected Websites?
b. What populations do these Websites serve (who is the intended audience)?
c. What sensitivity level should be assigned to each of the Websites (use FIPS 199 criteria)?
d. What security issues were observed
related reading: https://link.springer.com/chapter/10.1007/978-3-030-43575-2_22
The specific topic: hiding data in ECDSA signature's randomness in the Blockchain.
Talk about:
1) Background -
a) Why is it important?
b) What suboptimal method are you trying to improve?
c) How have problems similar to this been addressed?
2) The methodology -
a) What to use (eg. platform) to make it possible?
3) Testing -
a)How to test if it really works in the future(after developing it)?
I dont need a detailed algorithm. I just need a a general idea. This is a proposal.