Loki  is a great tool for demonstrating the concept of covert communication  channels. Our text uses the example of packing an ICMP packet with data,  something you wouldn’t typically find in an IP packet weaving its way  throughout the internet. As network defenders, what tools do we have to  identify covert communication channels, and is that something we should  really be concerned about anyway? In the event that we wanted to hunt  for covert communication channels, how could we measure our success?

You  must include at least one scholarly citation. This is not a "book  report", so please use your citation to underpin your understanding of  the subject matter but do not simply summarize your source. You are also  not allowed to use quotations from your source, nor are you allowed to plagiarize.

    • Posted: 13 days ago
    • Due: 
    • Budget: $10