You are on page 1of 7

Computer Security

Lab 1
Tutor: Kevin Johnson
Rojay Beharie 1601922
Activity 1.

VeraCrypt: VeraCrypt is a free open source software used for disk encryption. Its main features are that it is
capable of creating a virtual encrypted disk within a file and mounting it as a real disk, can encrypt an entire
storage device (such as a hard drive or flash drive) and is able to encrypt a partition or drive where the OS
is installed. In the screenshot below, the options to perform these features can be seen as follows:

VeraCrypt is most suitable for use when one wishes to not only encrypt regular day to day files (such as
word documents, folders, etc) but also highly important storage areas such as an entire hard drive or flash
drive.

The advantages of using VeraCrypt are as follows:


● Free and open source
● Files are decrypted only when they are in use, otherwise they are always encrypted (on-the-fly
encryption, OTFE)
● Supports several encryption cyphers
● Runs on multiple platforms

The disadvantages of using VeraCrypt are as follows:


● Requires above average knowledge and experience with encryption software to use effectively.

AxCrypt: Axcrypt is an easy to use encryption software that comes with many features to cater to the needs
of the average user. Its main features are a password management feature that allows users to store and
organize their numerous passwords in a safe environment, a password generator that creates incredibly
strong passwords that the user may use when creating accounts online and AES-128 bit and AES-256 bit
encryption standards.Cloud storage connection is also supported, which allows users to safely upload their
encrypted files to cloud storage services such as Dropbox and Google Drive. In the screenshot below the
UI of AxCrypt can be seen along with a list of folders that have been encrypted by the program:

AxCrypt is suitable for use in situations where a user is in need of an easy to use encryption software that
spans multiple platforms. The added password management features also add another dimension to the
usefulness and versatility of the program.

The advantages of AxCrypt can be summarised as follows:


● Multi-platform
● Advanced encryption system
● Password management features
● Built in sharing features
● Can create self extracting archives

The disadvantages of AxCrypt are:


● Must purchase the premium package to gain access to all the features of AxCrypt (for example
AES-256 encryption is only available in the premium plan)

7-Zip: 7-Zip is a free file compression and encryption program. This program boasts a hoast of features
including a high compresson ratio, AES-256 encryption and an array of different encryption, compression
and conversion methods for a plethora of different file formats. The following screenshot shows the different
options that 7-Zip affords its users:
7-Zip is best used in situations where the user needs a program that is capable of carrying out file
encryption, conversion and compression in many different file formats.

The advantages of 7-Zip can be summarised as follows:


● Versatile compression, encryption and conversion options
● High compression ratio
● AES-256 encryption
● Can make self extracting archives

The disadvantages of 7-Zip are as follows:


● Underwhelming UI
● No portable options available

CryptoExpert 8: CryptoExpert 8 is a program designed to provide secure data storage in the form of data
vaults. The program can secure vaults of unlimited size, and it uses Blowfish, Cast, 3DES and AES-
256 encryption algorithms. The following screenshot shows the trial version of CryptoExpert 8:

This software is most suited to conditions that require a program that can secure vast amounts of
data at once, as this is the main selling point of this program.

The main advantages of CryptoExpert 8 are:


● Can encrypt very large data vaults
● Works with the 32-bit and 64-bit versions of Windows 7, 8 and 10
● Users have the option to choose between BLOWFISH, CAST, 3DES or AES-256 encryption
● OTFE

The main disadvantages of CryptoExpert 8 are:


● Users must pay for the program, otherwise only a 30 day trial is available
● Not a good choice for the average user

GNU Privacy Guard: GNU Privacy Guard is an open source, cross platform encryption software.
The program features a key management system and the ability to not only encrypt files and
folders, but also communication channels such as email. The following screenshot shows the
sleek UI of the GNU Privacy Guard and the various options available to the user:
This program is best suited for experienced users who need a program that offers email encryption
and thorough key management.

The advantages of this software are:


● Cross-platform
● Supports multiple encryption algorithm (Blowfish, AES, etc) and compression types (ZIP,
BZIP2, etc)
● Allows encrypted communication (emails)
● Both Command Line and Graphical Interfaces available

The disadvantages of GNU Privacy Guard are:


● Steep learning curve for inexperienced users
● If not using the command line interface, finding a version of the GUI that the user will
understand may prove difficult

Activity 2.

From the given list of keyloggers, only 2 of them were detected by antivirus programs. These 2
were Kidlogger and REFOG. Kidlogger prompted the following reaction from Kapersky antivirus:
While REFOG prompted this response:

Spyrix and Actual did not illicit a response from Windows Defender nor from Kapersky, thus seem
more dangerous. In terms of maintaining anonymity, Spyrix seems to be the best as it allows the
user to remotely access the the information recorded by the keylogger thoguh the use of an online
account. By clicking on the “My Account” button below, a dashboard is opened in a browser
window that shows all the information recorded by the keylogger, thus the offending party does not
need to have access to the infected machine in order to see the information.

You might also like