QUESTION
As virtually every aspect of society becomes increasingly dependent on information and communications technology, our vulnerability to attacks on this technology increases. At the same time there is another side to this issue, which is if the technology can be used against society by the purveyors of malware and so on then technology may also be used positively in the pursuit of society's objectives. Some of the ways how this can be achieved are:
- Cryptography
- Steganography
- Cyber Antagonism
- Terrorist Use of the Internet
- Cyber-conflicts (War and Ethics in Cyberspace.)
Give a concise description of your understanding of each of the techniques mentioned above and discuss briefly their merits in named situations.