Network Security2

For an interesting article about STENOGRAPHY, 

please visit: http://www.computerworld.com/s/article/71726/Steganography_Hidden_Data. 

Then submit a 3 page review of this article, highlighting in your own words, the significance of its contents in terms of Network Security. Feel free to include additional related information culled from up to 2 added sources. Be sure to cite these sources properly in your paper and check your work (spelling, syntax, etc) prior to submittal.