Tag: National Cybersecurity Institute

Offshore Outsourcing in Healthcare Mitigation

There are some things that a healthcare organization can do to mitigate the risks inherent in off shoring. Setting up a organization for off shoring is a two-part effort. The first part is a clean room at the off shore site and the second is a secure Virtual Desktop Image (VDI). One international organization set …

Steganography: October 30 Challenge

Each steganography challenge presents an object that contains a hidden message. The object may be a block of text or the contents of a file. These challenges require creativity and some technical knowledge and skills to solve. In some cases you would benefit from being able to use a hexadecimal file editor. Knowledge of ASCII …

Steganography: October 29 Solution

Solution to October 29 challenge Use a hexadecimal editor to examine the contents of the image file:               The hexadecimal viewer shows the 8-bit pixel values consist of only the numbers 80 and 81. These two gray levels are so close together our eyes can not easily distinguish them. …

Steganography: October 29 Challenge

Each steganography challenge presents an object that contains a hidden message. The object may be a block of text or the contents of a file. These challenges require creativity and some technical knowledge and skills to solve. In some cases you would benefit from being able to use a hexadecimal file editor. Knowledge of ASCII …

Steganography: October 28 Solution

Solution to October 28 challenge Take all of the following data and enter it into a spreadsheet: 0,1 0,2 0,3 0,4 0,5 1,0 1,6 2,0 2,6 3,0 3,6 4,1 4,5 6,0 6,6 7,0 7,6 8,0 8,1 8,2 8,3 8,4 8,5 8,6 9,0 9,6 10,0 10,6 12,0 12,1 12,2 12,3 12,4 12,5 13,3 13,6 14,3 14,6 …

Steganography: October 28 Challenge

Each steganography challenge presents an object that contains a hidden message. The object may be a block of text or the contents of a file. These challenges require creativity and some technical knowledge and skills to solve. In some cases you would benefit from being able to use a hexadecimal file editor. Knowledge of ASCII …

Steganography: October 27 Solution

Solution to October 27 challenge Given the following alphanumeric message, look up the ASCII codes for each alphanumeric symbol and write down the least significant bit: E8BMQY6 KL2FJGU WZTS4PA So, for example, an ASCII E has a hexadecimal code of 45, which is 1000101 binary, and the least significant bit is 1. In a similar …

Steganography: October 27 Challenge

Each steganography challenge presents an object that contains a hidden message. The object may be a block of text or the contents of a file. These challenges require creativity and some technical knowledge and skills to solve. In some cases you would benefit from being able to use a hexadecimal file editor. Knowledge of ASCII …

Steganography: October 26 Solution

Solution to October 26 challenge The carrier message is “All these tests are canned knowledge no one wants.” To find the hidden message, take the first letter of each word. The hidden message is: Attacknow

Steganography: October 26 Challenge

Each steganography challenge presents an object that contains a hidden message. The object may be a block of text or the contents of a file. These challenges require creativity and some technical knowledge and skills to solve. In some cases you would benefit from being able to use a hexadecimal file editor. Knowledge of ASCII …