ethical hacking

A minimum of 200 words is required, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 200 word requirement.

Discussion Question 1:

Compare and contrast different types of Steganography methods that are used for hiding confidential data.

Discussion Question 2:

Identify necessary countermeasures that should be performed by users for preventing their systems from various malware threats