Discuss anti-forensics techniques and explain how to detect steganography, hidden data in file system structures, trail obfuscation, and file extension mismatch.
Operating System Host Firewalls
There are many recommendations, guidelines, and best practices for firewall management. Some argue that an operating system’s host firewall software may offer sufficient security. Therefore, they suggest, all options should be evaluated before discounting the operating system’s host firewall software. List and explain five typical firewall guidelines or best