Monday, October 30, 2017

Critique of A Review Article



Every day throughout history they have found technology changes as fast as you can buy the latest hardware or software.  Information security is actually quite younger than computers, as it was not needed immediately after their creation.  As the technology continues to rapidly evolve and develop so quickly, it is becoming difficult to keep up with the required internet security changes.  Originally, cryptography was used on a regular basis for encryption between users when messaging one another.  Although cryptography has now become inadequate over time.  This security vulnerability within cryptography of requiring a secret key allows a hacker the ability to decipher it easily.  Once the risks were found in cryptography due to the rapid growth in technology and the average humans understanding, steganography was developed in its place.  When utilizing steganography for communication it would embed the message within a cover medium, such as an image.
As the author discusses the techniques of image steganography, there is an introduction, comparison, background, reason, history, classification, benefits, drawbacks, just to name a few.  Throughout this article Chugh achieves displaying the resources to the readers, through the many strengths and weaknesses that will be dissected and explained.  Dissected information may include material, such as the data and sources provided, grammar, structure, authors argument, ideas, and support; as this article will be examined, evaluated, and reviewed entirely.  As image steganography studies and techniques are reviewed by Chugh, to provide a full review and explanation of the image steganography techniques available today.  When reading the article, it is obvious that he clearly utilized multiple sources such as studies, surveys, and journals.  Luckily, he was able to quote these resources well throughout his own article to strengthen the ideas of image steganography.
Providing the readers with background information on steganography such as the history of the word, originating from Greek meaning “covered or protected”, and rapid growth history.  As Chugh argues his point regarding history, “Due to the prohibition and restriction imposed by the government on cryptographic systems, steganographic technologies are a very important part of the future […]. (Chugh, 2013)”, this makes internet security growth very difficult to keep up with..  Chugh then recommends the argument towards the interest in image steganography when, “Publishing and broadcasting industries have become interested in techniques for hiding encrypted […]” (Chugh, 2013).  Steganography in general has actually been around a lot longer than you would have imagined dating back to 1499, as information hiding was extremely messy but useful for many reasons.  Chugh mentions many known historical figures who used some sort of information hiding (steganography) to send hidden message to another person.  Although, in the technological world today, there are many more ways to utilize steganography than there were in the 1800’s.  There are a total of four steganography categories, text, images, audio/video, and protocol; Chugh lists these out as a numerical list it allows the reader to see these clearly.  A small section mentions the process of steganalysis which is cracking the steganographic process, also known as hacking.
 As we move further along, Cugh’s strengthens his argument by discussing image steganography in further detail.  There are many diagrams to assist the readers understanding with the information given.  Image Steganography can be utilized by hiding information such as data in text, images, audio files, and in protocols.  The concept well known in the technical world of “What You See Is What You Get” applies in Image Steganography as well.  There are only two steps in the steganography system and it is completed.
Image steganography can be checked for effectiveness by comparing the stego image with the cover image.  To determine the effectiveness, the following are some factors that can be checked, robustness, imperceptibility, payload capacity, PSNR, MSE, SNR, NCC, and BER.  As shown in Cugh’s article in Figure 4, the two most popular schemes used for image steganography are spatial domain and transform domain.  Cugh continues to strengthen his article by providing more information on image steganography and different techniques.  Such as the Least Significant Bit Method, Masking and Filtering, Parity Checker Method, Gray Level Modification, Pixel value Differencing technique, Algorithms and Transformations, and each has their own advantages and drawbacks provided.  Similar there are benefits and drawbacks of steganography also, it would be beneficial to utilize cryptography with steganography.
Cugh provides readers with a current list of applications that utilize image steganography to give them an idea as to what we could do if it was progressed any further in the future.  Image steganography only hides the message, it does not actually encrypt the message, we would need to utilize cryptography with steganography to gain that ability.  Copyright Protection, which is used to ensure everyone knows that the steganography “item” is owned.  Feature Tagging, is similar to tagging on Facebook except it would be embedded, so it would contain the user or name of person and possibly their location.  Digital Watermarking is the ability to embed a digital watermark inside of an image in order for someone to verify the full authenticity.  The worst application yet, use by terrorists, steganography is and can be used at an extremely large scale by terrorist to hide messages secretly to spread terrorism across the country. (Chugh, 2013)
References
Chugh, G. (2013). Image Steganography Techniques: A Review Article. Acta Technica Corviniensis - Bulletin Of Engineering, 6(3), 97-104.

Viruses


Viruses can be very difficult to detect, analyze, and remove.  A few of the ways a virus can infect a computer is by contaminated media devices, through networking sites or emails, or even as part of a program.  Viruses can do many things once on the computer such as, simply sitting there, damaging data, destroying the OS, and even spreading to other devices. 
Three symptoms of which you may notice when your computer is infected with a virus is, programs loading slower than normal, system randomly shutting itself down or starting up by itself, and even strange files appearing or regular files disappearing. These are not all of the symptoms but definitely a few key markers to keep an eye out for. 
If you notice any of these symptoms or anything similar, it is best to take immediate action.  Make sure your antivirus software is up to date as these could have been the cause of the infection.  Once your antivirus software is fully up to date go ahead and run a full scan on the system.  This scan may take some time so step away to take a breather and get a cup of coffee to pass the time.


Wednesday, October 25, 2017

Proposal



Even though you may not think you need a file server because you are a small business, well that is one of the main reasons you should own one.  In today's world larger businesses use data centers or even the cloud for file services that a simple stand-alone file server could provide.  The prices for a stand-alone file server have reduced over the years, so now is the best time to invest in one.  The initial cost of a file server is an investment comparatively speaking to other options that cost monthly.  We will discuss all the file server component options available to ensure we find the best fit for your company.  Consider this file server one of your own employees and the investment you place in it will return ten-fold.
File servers are computers with a different operating system than your workstations, and specifically contain all your businesses critical files to ensure they are secure and redundant.  Starting off with a terabyte gives your company room to grow and expand as you need, plus the ability to keep every file you deem necessary.  Considering this device known as your file server would contain sensitive documentation and files, a terabyte hard drive with a redundant drive would work beautifully.  Remember, it is best to have a redundant hard drive as it is a backup of the original, this will ensure if one fails there is another to fall back on that would contain a copy of the first.
Storage Comparison
Brand
Western Digital
Seagate
Western Digital
Seagate
Model
WD10EZRZ
ST1000NM0011
WD1004FBYZ
ST31000640SS
Capacity
1 Terabyte
1 Terabyte
1 Terabyte
1 Terabyte
Cache
64 MB
64 MB
128 MB
16 MB
RPM
5400 RPM
7200 RPM
7200 RPM
7200 RPM
Price
$49.99
$175.49
$98.99
$131.49
Some people may say the more memory a computer has the better, but that is not always the case.  A simple file server that has only thirty to fifty employees accessing files simultaneously throughout the day could run smoothly with a capacity of anywhere between 16 GB to 32 GB of memory.  The capacity of memory is only the beginning as the data rate and timing plays a huge role in how a server would perform with it.  Recently released memory can contain data rates upwards of DDR4, but a simple DDR3 would do the job perfectly also.  I have listed just a few options when comparing memory purchases.  With the below available to choose from the best choice that I would recommend is the G.Skill Trident Z as it has a high capacity, good over-clockability and a moderate per-GB price.  This specific memory kit is definitely a bargain for a DDR4 with more than 16GB.
Memory Comparison
Name
G.Skill Ripjaws X
Corsair Vengeance Pro
Patriot Viper 4
G.Skill Trident Z
Model
F3-14900CL10D16GBXL
CMY32GX3M4A28
PV416G340C6K
F4-3000C15D-32
Data Rate
DDR3-1866
DDR3-2800 (XMP)
DDR4-3400 (XMP)
32GB (2x 16GB)
Capacity
16GB (2x 8GB)
32GB (4x 8GB)
16 GB (2x 8GB)
DDR4-3000 (XMP)
Timings
10-11-11-30
12-14-14-36
16-18-18-36 (2T)
15-15-15-35 (2T)
Cost
$119.00
$575.99
$149.00
$239.99
A CPU is by far the number one component to splurge on, as without a strong CPU a computer is pretty much useless when processing multiple tasks at a time.  To ensure you have a strong enough CPU, there are many things to factor into the equation. For example, the operating frequency should be at least about 2.6GHz or so.  The number of cores also plays a large part between an average Quad-Core or larger.  There are quite a few CPU manufacturers but the well known top two competitors are Intel and AMD.  The brand selection comes down to personal preference and not so much the cost of purchase.
CPU Comparison
Brand
Intel
AMD
Intel
AMD
Name
Xeon X5550
Opteron 6320
Xeon E3-1240 v5
Opteron 6348
# of Cores
Quad-Core
8-Core
Quad-Core
12-Core
Operating Frequency
2.66 GHz
2.8 GHz
3.5 GHz
2.8GHz
L2 Cache
4 x 256KB
4 x 2MB

6 x 2MB
L3 Cache
8MB
2 x 8MB
8MB
2 x 8MB
Cost
$61.01
$315.72
$274.99
$616.19

Aside from the internal components of a file server the external input and output peripherals will need to be purchased also.  From the basic input devices such as a keyboard and mouse will be easy to select as you may even have some extra's lying around the office.  To the main output device the computers screen, also known as a monitor.  File servers can even second as a print server, by simply setting up the printer output device to run specifically from the server.  This would allow employees to print their files from the comfort of their desk and pick it up wherever you find easiest.
Overall, there are numerous variables to factor in when considering an investment in a file server.  After discussing a majority of the variables, the file server should be affordable and effective.  The file server recommendation is tower shell housing with a two terabyte redundant hard drives for storage.  The Intel CPU Xeon E3-1240 v5, which has 3.8GHz operating frequency and is a quad-core, as it is the best deal for the cost of $274.99.  Next up is the memory expansion recommendation of the Patriot Viper 4.  The data rate is much higher than the others but the price is not a huge difference at a whopping $149.  This memory set comes with two sticks of 8GB memory totaling 16GB, which is more than enough.  This system will take your small business above and beyond if you will let it.
References
Englander, I. (2014). The Architecture of Computer Hardware, Systems Software, & Networking An information technology approach. Don FowleY.
NewEgg. (n.d.). Retrieved February 24, 2017, from NewEgg: http://www.newegg.com
PCWorld. (2009, May 8). Do You Need a File Server? Retrieved February 24, 2017, from PCWorld: http://www.pcworld.com/article/164632/do_you_need_a_file_server.html

Binary Conversions

The conversion of numbers is common in mathematics and has been used for many generations.   During the creation of computers number co...