A security analyst has been notified that trade secrets are being leaked from one of the executives
in the corporation. When reviewing this executive’s laptop they notice several pictures of the
employee’s pets are on the hard drive and on a cloud storage network. When the analyst hashes
the images on the hard drive against the hashes on the cloud network they do not match. Which of
the following describes how the employee is leaking these secrets?
A.
Social engineering
B.
Steganography
C.
Hashing
D.
Digital signatures