2.Define Authentication?
Authentication is important to any secure system, as it is key to verifying the
source of the message or that an individual is whom he or she claims. The NIGA
defines authentication as a “security measure designed to establish the validity of
a transmission message or originator or a means of verifying individual’s
authorization to receive specific categories of information”.
3.what is a botnet?
A botnet is a collection of internet-connected devices, which may include PCs,
servers, mobile devices and internet of things devices that are infected and
controlled by a common type of malware. Users are often unaware of a botnet
infecting their system.
Infected devices are controlled remotely by threat actors, often cybercriminals,
and are used for specific functions, so the malicious operations stay hidden to the
user. Botnets are commonly used to send email spam, engage in click fraud campaigns
and generate malicious traffic for distributed denial-of-service attacks.
4.define steganography?
Steganography is data hidden within data. Steganography is an encryption technique
that can be used along with cryptography as an extra-secure method in which to
protect data.
Steganography techniques can be applied to images, a video file or an audio file.
Typically, however, steganography is written in characters including hash marking,
but its usage within images is also common. At any rate, steganography protects
from pirating copyrighted materials as well as aiding in unauthorized viewing.
CH.MANIKANTHA
17131A0217