Talk With an Expert

A Discussion of Covert Channels and Steganography

A Discussion of Covert Channels and Steganography (PDF, 1.85MB)Published: 19 Mar, 2002
Created by
Mark Owens

Although the current threat of steganographic technology appears to lag its usefulness, the diligent information systems person needs to be mindful of the security ramifications that a covert channel in their enterprise carries. Myriad techniques for secreting information flow exist; eliminating them is an impossible task. In order to protect ourselves, we must apply the dynamics that serve so well in other unpredictable information security risk venues: assess the risk, find ways to quickly detect the exploit's use, determine an appropriate response and use whatever means available to impede the perpetrator allowing time for detection and reaction mechanisms to work.