Information Systems


In 250 words or more, answer the following.

Give an example when you might find steganography useful. Why you would consider using it instead of another type of encryption?

How and why do hackers leave the backdoor open for themselves? Use any current topic or article related to penetration techniques.