What tools we have to identify covert communication channels


Discussion: Cybersecurity

Loki is a great tool for demonstrating the concept of covert communication channels. Our text uses the example of packing an ICMP packet with data, something you wouldn't typically find in an IP packet weaving its way throughout the internet. As network defenders, what tools do we have to identify covert communication channels, and is that something we should really be concerned about anyway? In the event that we wanted to hunt for covert communication channels, how could we measure our success?

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Request for Solution File

Ask an Expert for Answer!!
Management Information Sys: What tools we have to identify covert communication channels
Reference No:- TGS02995567

Expected delivery within 24 Hours