Have you heard of Digital Image Confidentiality? It is an electronic computer fraud that can be very annoying. This system takes your image and puts it on a disk or in a CD-ROM. The disc is then inserted into the computer’s drive and the disc is protected with a password.
Now, there are three kinds of Digital Image Confidentiality that is in use. They are PASSWORD, EXTERNAL, and INTEGRITY. In the password the image on the disk is completely erased and the password to the disk is contained in the software.
In External, the disk contains code to bypass the protection of the computer as to make it able to let someone transfer it to a foreign government or even foreign individuals who do not know how to encrypt their own computer. In Integrity, the disk is encrypted so that only the rightful owner of the disk can decode it. If the disk is encrypted, then no one can access it.
The last type of Digital Image Confidentiality is INTEGRITY. With this system, the disk is encrypted but the code is not included in the software and is also not part of the program. In other words, all the security measures cannot be used. However, anyone who knows the code will be able to extract the picture from the disk.
There are two types of uses for Digital Image Confidentiality. These are Offensive and Defensive.
Offensive uses include running an image of someone else’s property to get to it. While doing this, the person that is being targeted may have passed the password but will be able to read the disk. It is not recommended to do this if the disk is encrypted.
Defensive uses include protecting disk images that may contain personal information about a person such as a driver’s license or social security number. There is also Disk image Security. The disk is encrypted before being transmitted.
There are some systems that can be used to protect a disk image security. These include first copying the disk and then using code to enable the copy to become unreadable.
Many things can be done to protect the disk image security from being deciphered. One of the things is to use software that scans a disc and creates an encryption code before it is sent.
One way to protect the disk image confidentiality is to encrypt it and use a computer virus to destroy any virus that might be on the disk. The virus may enter the computer while the disk is being sent and cause it to be destroyed.
Do not be concerned if you find that a disk containing your pictures has been encrypted. You can still view it by using software that has a disk image security code.