Cybersecurity: Steganography, Malware, Password
Policies, and Wireless Network Attacks
August 3, 2025
Contents
1 Steganography 2
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 How Steganography Works . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Common Techniques of Steganography . . . . . . . . . . . . . . . . . . . 2
1.4 Applications of Steganography . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Detection of Steganography (Steganalysis) . . . . . . . . . . . . . . . . . 3
1.6 Prevention and Countermeasures . . . . . . . . . . . . . . . . . . . . . . 3
1.7 Difference Between Steganography and Cryptography . . . . . . . . . . . 4
1.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Difference Between Virus and Worm 4
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2 Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.3 Worm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.4 Key Differences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3 General Guidelines for Password Policies 5
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2 General Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.3 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4 Attacks on Wireless Networks 7
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2 Common Types of Attacks on Wireless Networks . . . . . . . . . . . . . 7
4.3 Impacts of Wireless Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.4 Prevention and Countermeasures . . . . . . . . . . . . . . . . . . . . . . 9
4.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1
1 Steganography
1.1 Introduction
In cyber security, steganography is the art and science of hiding secret data inside another
harmless-looking file or message so that no one suspects the existence of the hidden
information. The word steganography comes from the Greek words:
Steganos → Covered or hidden
Graphein → To write
Unlike cryptography, which scrambles the content so it cannot be understood, steganog-
raphy conceals the fact that a secret message exists at all. It is often used by attackers
to secretly transmit malware, stolen data, or secret communications.
1.2 How Steganography Works
Steganography hides data within digital carriers such as images, audio, video, text files,
or network protocols. The carrier looks normal to a casual observer, but inside it contains
the hidden message.
Basic steps:
• Selection of carrier file → Choose an image, audio, video, or text file.
• Embedding process → Hide secret data inside the carrier without noticeably chang-
ing its appearance or size.
• Transmission → Send the carrier file to the recipient through normal channels.
• Extraction → The recipient uses a special tool or method to retrieve the hidden
data.
1.3 Common Techniques of Steganography
1. Image Steganography
• Most popular method.
• Secret data is hidden in Least Significant Bits (LSB) of image pixels.
• The change is so small that the human eye cannot notice it.
• Example: Hiding a text message inside a .png file.
2. Audio Steganography
• Hides data within audio files such as .wav or .mp3.
• Techniques include LSB coding, echo hiding, and phase coding.
• Example: Hiding a secret key inside a music file.
3. Video Steganography
• Embeds data in video frames.
• Uses a large amount of storage capacity in video files to hide bigger data.
2
• Example: Storing confidential documents inside a .mp4 movie file.
4. Text Steganography
• Uses patterns in spacing, fonts, or arrangement of text to hide data.
• Example: Extra spaces at the end of sentences represent binary values.
5. Network Steganography
• Embeds data within network packets or unused header fields.
• Example: Covertly transmitting malware through HTTP headers.
1.4 Applications of Steganography
Positive Uses
• Secure communication for journalists or activists in censorship-heavy countries.
• Digital watermarking to protect copyright.
• Secure exchange of sensitive research or business data.
Negative Uses
• Concealing malware or ransomware inside image/video files.
• Secretly transferring stolen data.
• Communication between cybercriminals or terrorists.
1.5 Detection of Steganography (Steganalysis)
Steganalysis is the process of detecting the presence of hidden information. Common
methods include:
• Statistical analysis of file properties.
• Comparing suspected files with original versions.
• Using tools that scan for irregularities in pixel values or audio patterns.
1.6 Prevention and Countermeasures
• Scan files with updated anti-malware software.
• Use firewalls and intrusion detection systems to monitor suspicious network traffic.
• Apply data loss prevention (DLP) solutions to inspect outbound files.
• Restrict use of unnecessary file types for data transfer.
3
1.7 Difference Between Steganography and Cryptography
Aspect Steganography Cryptography
Purpose Hides the existence of a Scrambles the message so
message its unreadable
Visibility Message is invisible Encrypted message is visi-
ble but unreadable
Detection Hard to detect without ste- Easy to detect but hard to
ganalysis decode
Security If detected, message can be Requires decryption key to
read read
1.8 Conclusion
Steganography is a powerful method of covert communication that hides information
inside ordinary files. While it has legitimate uses such as digital watermarking and secure
communication, it is also misused by cybercriminals for data exfiltration and malware
distribution. Security professionals must use steganalysis and monitoring tools to detect
such hidden data and protect systems from covert threats.
2 Difference Between Virus and Worm
2.1 Introduction
Both viruses and worms are types of malicious software (malware) that can damage
computer systems, but they work in different ways. A computer virus attaches itself to
a legitimate file or program and spreads when the infected file is executed. A worm is a
standalone malicious program that can spread automatically without needing to attach
to another file or be run manually. Understanding the difference helps in prevention and
removal strategies.
2.2 Virus
Definition:
A virus is a type of malware that infects files or programs and spreads when the infected
program is executed by the user.
Key Features:
• Needs a host file to spread.
• Activated only when the infected file is executed.
• Often spreads through USB drives, email attachments, pirated software.
Example:
• ILOVEYOU Virus spread via email attachments in 2000.
• Melissa Virus spread through infected Word documents.
4
2.3 Worm
Definition:
A worm is a self-replicating program that can spread across computers and networks
without needing to attach to a host file.
Key Features:
• No host file required.
• Spreads automatically via networks, emails, instant messages.
• Often consumes network bandwidth and slows down systems.
Example:
• Conficker Worm infected millions of Windows PCs in 2008.
• Code Red Worm attacked Microsoft IIS servers in 2001.
2.4 Key Differences
Aspect Virus Worm
Dependency Needs a host file or program Standalone program
to spread
Activation Runs when infected file is Runs automatically after
executed entering system
Spreading File sharing, email attach- Network connections, email,
Method ments, removable drives internet
Replication Requires user action Self-replicates without user
action
Damage Corrupts files, modifies Consumes bandwidth, slows
data, crashes programs networks, can drop addi-
tional malware
Example ILOVEYOU, Melissa Conficker, Code Red
2.5 Conclusion
Viruses and worms are both dangerous types of malware, but worms can spread much
faster because they do not need a host file or user action. Prevention requires a combi-
nation of updated antivirus software, firewalls, safe browsing habits, and regular system
updates.
3 General Guidelines for Password Policies
3.1 Introduction
A password policy is a set of rules designed to improve computer security by encouraging
users to create strong, secure passwords and manage them properly. Weak or poorly man-
aged passwords are one of the most common causes of unauthorized access. Following a
well-designed password policy helps protect accounts from brute-force attacks, dictionary
attacks, and social engineering.
5
3.2 General Guidelines
1. Minimum Password Length
• Passwords should be at least 812 characters long.
• Longer passwords are harder to guess or crack.
2. Complexity Requirements
• Use a combination of:
– Uppercase letters (AZ)
– Lowercase letters (az)
– Numbers (09)
– Special characters (!, @, #, $, %, etc.)
• Avoid predictable patterns like 12345 or password.
3. Avoid Common Words and Personal Info
• Do not use easily guessable words like:
– Names of family members or pets
– Birthdays, phone numbers, or simple sequences
• Example: Avoid passwords like rahul123 or mumbai@123.
4. Change Passwords Regularly
• Change passwords every 6090 days.
• Avoid reusing old passwords.
5. Use Different Passwords for Different Accounts
• Do not use the same password for email, banking, and social media.
• If one account is compromised, others remain safe.
6. Enable Multi-Factor Authentication (MFA)
• Combine passwords with:
– OTPs (One-Time Passwords)
– Security tokens
– Biometric authentication (fingerprint, face ID)
7. Avoid Writing Down Passwords
• Never write passwords on sticky notes or store them in plain text.
• Use a secure password manager if needed.
8. Lock Accounts After Failed Attempts
• Systems should automatically lock the account after 35 failed login attempts
to prevent brute-force attacks.
6
9. Educate Users About Phishing
• Remind users never to share passwords through email, messages, or calls.
• Be cautious of fake login pages.
10. Secure Storage of Passwords
• Store passwords using strong encryption and hashing (e.g., SHA-256, bcrypt).
• Never store passwords in plain text on servers.
3.3 Conclusion
A strong password policy ensures that passwords are difficult to guess, regularly updated,
and safely stored. By following these guidelines, organizations and individuals can reduce
the risk of unauthorized access and protect sensitive information effectively.
4 Attacks on Wireless Networks
4.1 Introduction
Wireless networks have revolutionized communication by allowing devices to connect
without physical cables. From home Wi-Fi to public hotspots, wireless connectivity
is now everywhere. However, the same openness and convenience that make wireless
networks popular also make them vulnerable. Because data is transmitted over radio
waves, attackers do not need physical access to the network they can exploit it from a
distance using specialized tools. These attacks can lead to data theft, service disruption,
or complete network compromise.
4.2 Common Types of Attacks on Wireless Networks
1. Eavesdropping (Passive Attack)
• Eavesdropping is one of the most basic threats. Here, an attacker listens to
wireless communication to capture sensitive information such as usernames,
passwords, or credit card details.
• If the network uses weak or no encryption (like open public Wi-Fi), attackers
can capture packets using tools such as Wireshark.
• Although the attacker does not alter the communication, this violates confi-
dentiality.
2. Rogue Access Points & Evil Twin Attacks
• A rogue access point is an unauthorized wireless AP installed inside a network
without permission.
• An Evil Twin is a more dangerous variant where the attacker sets up an AP
with the same SSID as a legitimate one.
• Unsuspecting users connect to the attackers AP, thinking its trusted.
7
• This allows Man-in-the-Middle (MitM) attacks where the attacker can read,
modify, or inject malicious data.
3. MAC Address Spoofing
• Wireless networks often filter devices using their MAC address.
• In MAC spoofing, the attacker changes their devices MAC address to imper-
sonate an authorized device and gain access.
• This bypasses MAC filtering and can also hide the attackers real identity.
4. Denial of Service (DoS) / Jamming
• In this attack, the attacker floods the wireless channel with interference or
excessive traffic, making it impossible for legitimate devices to connect.
• One common method is sending deauthentication frames to force users off the
network repeatedly.
• Jamming can cause major disruption in business and public services.
5. Packet Sniffing and Replay Attacks
• Attackers can capture legitimate packets and later replay them to trick the
system into granting access.
• For example, replaying authentication handshakes in WPA/WPA2 networks
can help crack passwords.
• Replay attacks are often combined with dictionary or brute-force attacks for
faster cracking.
6. Wi-Fi Encryption Cracking
• Older encryption protocols like WEP are vulnerable and can be cracked in
minutes using tools like Aircrack-ng.
• Even WPA/WPA2 can be cracked if weak passwords are used.
• Once the attacker gets the key, they can join the network and sniff all traffic.
4.3 Impacts of Wireless Attacks
• Loss of Confidentiality Personal and corporate data theft.
• Loss of Integrity Attackers may alter transmitted data.
• Loss of Availability Network downtime due to DoS/jamming.
• Financial Loss Fraudulent transactions or stolen intellectual property.
• Reputation Damage Customers lose trust in compromised services.
8
4.4 Prevention and Countermeasures
• Use Strong Encryption Always use WPA3 or at least WPA2 with a strong
passphrase. Avoid WEP.
• Change Default Credentials Modify default SSID and admin passwords on
routers.
• MAC Filtering with Monitoring Though not foolproof, it can block casual
attackers.
• Disable SSID Broadcast Makes it harder for casual scanning tools to detect the
network.
• Wireless Intrusion Detection Systems (WIDS) Detect rogue APs, spoofing,
and jamming attempts.
• Use VPN on Public Wi-Fi Encrypts all traffic, preventing eavesdropping.
• Regular Security Audits Test networks periodically for vulnerabilities.
• User Awareness Educate users to avoid connecting to unknown networks.
4.5 Conclusion
Wireless networks are essential for modern communication but remain an attractive tar-
get for attackers due to their open nature. Attacks such as eavesdropping, rogue APs,
jamming, and encryption cracking can cause serious damage to individuals and organi-
zations. The best defense is a combination of strong encryption, strict access controls,
active monitoring, and user awareness. By following best practices, wireless networks can
remain secure while providing the flexibility and convenience they are designed for.