Discuss anti-forensics techniques and explain how to detect steganography, hidden data in file system structures, trail obfuscation, and file extension mismatch.
1. What do you think is the most difficult of the 18 CIKR sectors to protect, and why? Course Textbook(s) Lewis, T. G. (2020). Critical
1. What do you think is the most difficult of the 18 CIKR sectors to protect, and why? Course Textbook(s) Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley.