Discuss anti-forensics techniques and explain how to detect steganography, hidden data in file system structures, trail obfuscation, and file extension mismatch.
LAB
See attached. Lab3: Defining a Security Policy Framework In this lab, you will research security policy frameworks. Next, you will determine the appropriate security policy definitions to mitigate specific risks, threats, or vulnerabilities. You will organize your results into a framework that can become part of a layered security strategy.