1. a Ping Sweep A) Sends ICMP Echo Requests to the Target

Total Page:16

File Type:pdf, Size:1020Kb

1. a Ping Sweep A) Sends ICMP Echo Requests to the Target 1. A ping sweep A) Sends ICMP echo requests to the target machine B) Is an exploit that creates a denial of service (DoS) using ICMP echo requests C) Is a method of clearing your network D) Determines what services are running on a system Points Earned: 1.0/1.0 Correct Answer(s): A 2. What is an unstructured threat? A) An attack that is uncoordinated, nonspecific, and lasts a short amount of time B) An elite hacker who mounts an attack against a specific target C) A poorly engineered building D) A type of malicious code that formats the hard drive on a computer. Points Earned: 1.0/1.0 Correct Answer(s): A 3. In 2009 _______________ was cut and resulted in widespread phone and Internet outages in the San Jose area of California. Points Earned: 1.0/1.0 Correct Answer(s): Fiber cable 4. A successful attack on a network may adversely impact security in all the following ways EXCEPT: A) Loss of confidentiality B) Loss of integrity C) Loss of functionality D) Loss of availability Points Earned: 1.0/1.0 Correct Answer(s): C 5. Which of the following is not one of the three general methods used in authentication? A) Something you do B) Something you have C) Something you are D) Something you know Points Earned: 1.0/1.0 Correct Answer(s): A 6. Authentication means that the person who sends and e-mail will be unable to deny sending the e-mail. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): False 7. The first step an administrator can take to reduce possible attacks is to A) Install a firewall B) Ensure all patches for the operating system and applications are installed C) Configure an intrusion detection system D) Install anti-spyware software Points Earned: 1.0/1.0 Correct Answer(s): B 8. The term "script kiddies" refers to A) A children's television show B) A type of video game C) A hacker of low-end technical ability D) An Internet site for peer-to-peer music sharing Points Earned: 1.0/1.0 Correct Answer(s): C 9. As the level of sophistication of attacks _________, the level of knowledge necessary to exploit vulnerabilities decreased. Points Earned: 1.0/1.0 Correct Answer(s): increased 10. A person who tries to gradually obtain information necessary to compromise a network— by first appealing for help, and then, if necessary, by a more aggressive approach—is a(n) __________. A) phreaker B) social engineer C) hacktivist D) terrorist Points Earned: 1.0/1.0 Correct Answer(s): B 11. Ensuring that users have access only to the files they need to complete their tasks is an example of which principle? A) Least privilege B) Implicit deny C) Keep it simple D) Separation of duties Points Earned: 1.0/1.0 Correct Answer(s): A 12. The ability to manage whether a subject can interact with an object is called _______________. Points Earned: 1.0/1.0 Correct Answer(s): access control 13. Fifty years ago, few people had access to a computer system or network, so securing them was a relatively easy matter. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): True 14. Vladimir Levin was able to steal $10 Million from _______________ by using its cash management system. Points Earned: 1.0/1.0 Correct Answer(s): Citibank 15. The hacker was successful in breaching the firewall, the packet filtering router, and the internal firewall, but was quickly detected and unable to get past the workstation personal firewall. This is an example of what principle? A) Job rotation B) Layered security C) Security through obscurity D) Diversity of defense Points Earned: 1.0/1.0 Correct Answer(s): B What is the problem described by the van Eck phenomenon and studied under TEMPEST? A) Magnetic fields that interfere with signals crossing Local Area Network (LAN) cables B) Electromagnetic pulses destroying sensitive computer equipment C) Piggybacking on electromagnetic communications D) Electromagnetic eavesdropping Points Earned: 1.0/1.0 Correct Answer(s): D 2. Halon is effective at putting out fires and safe for humans but can damage equipment. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): False 3. Your boss needs instructions explaining the steps of how to send encrypted email properly for all employees. You will need to create the _________. A) procedure B) policy C) guideline D) standard Points Earned: 1.0/1.0 Correct Answer(s): A 4. Voice recognition, iris scans, and facial geometry can be used for biometric access controls. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): True 5. Shoulder surfing is when a person looks over the shoulder of another person while typing pins or passwords. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): True 6. Standards are recommendations relating to a policy. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): False 7. When an attacker attempts to get credit card numbers using telephone and voice technologies, it's called A) Phreaking B) Telephishing C) Vishing D) Voicing Points Earned: 1.0/1.0 Correct Answer(s): C 8. One of the most effective tools for foiling the efforts of a social engineering attack is an active security awareness program. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): True 9. The greatest danger to networks comes from A) Attacks coming across the public switched telephone network B) Natural disasters C) Foreign hackers D) Insiders Points Earned: 1.0/1.0 Correct Answer(s): D 10. When an attacker tries to position himself behind a user so that he can see what keys are being typed or what information is on the screen is called _______________ Points Earned: 1.0/1.0 Correct Answer(s): shoulder surfing 11. _______________ are mandatory elements regarding the implementation of a policy. Points Earned: 1.0/1.0 Correct Answer(s): Standards 12. Statements made by management that lays out the organization's position on an issue are called ________. A) procedures B) policies C) guidelines D) standards Points Earned: 1.0/1.0 Correct Answer(s): B 13. All of the following are characteristics of a strong password EXCEPT: A) Contains special characters, i.e., *%$#@ B) Contains numbers and letters C) Contains an uncommon dictionary word D) Contains at least eight characters Points Earned: 1.0/1.0 Correct Answer(s): C 14. _______________ is the simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a room or building. Points Earned: 1.0/1.0 Correct Answer(s): Piggybacking 15. _______________ are devices that have batteries that are used to keep equipment running in the event of a power outage. Points Earned: 1.0/1.0 Correct Answer(s): UPS 1. _______________ is done by comparing the input plaintext to the output ciphertext to try to determine the key used to encrypt the information. Points Earned: 1.0/1.0 Correct Answer(s): Differential cryptanalysis 2. The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called A) Key management B) Steganography C) Cryptanalysis D) Cryptography Points Earned: 0.0/1.0 Correct Answer(s): D 3. PKI can be used as a measure to trust individuals we do not know. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): True 4. Keyspace refers to A) All possible key values B) The number of keys needed to encrypt or decrypt a message C) The location where keys are stored D) The portion of the algorithm that the key connects with to encrypt or decrypt a message Points Earned: 1.0/1.0 Correct Answer(s): A 5. The benefit of SHA-1 over MD5 is that it is resistant to a collision attack. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): False 6. All of the following are asymmetric encryption algorithms EXCEPT: A) ECC B) RSA C) 3DES D) ElGamal Points Earned: 1.0/1.0 Correct Answer(s): C 7. The process for protecting intellectual property from unauthorized used is called A) Digital signatures B) Digital rights management C) Key escrow D) Anti-pirating management Points Earned: 1.0/1.0 Correct Answer(s): B 8. What is a certificate authority? A) An entity that generates electronic credentials B) An entity that requires proof of identity from the individual requesting a certificate C) A centralized directory in which the registered certificate is stored D) An entity that generates a digitally signed identification certificate Points Earned: 1.0/1.0 Correct Answer(s): D 9. Hiding a text file in a jpg file is an example of steganography. A) True B) False Points Earned: 1.0/1.0 Correct Answer(s): True 10. The encryption method based on the idea of using a shared key for encryption and decryption of data is A) Symmetric encryption B) Elliptical curve encryption C) Hashing function D) Asymmetric encryption Points Earned: 1.0/1.0 Correct Answer(s): A 11. The term used to describe a centralized directory that can be accessed by a subset of individuals is _______________ Points Earned: 1.0/1.0 Correct Answer(s): certificate repository 12. The cipher that replaces each letter of the alphabet with a different letter (not in sequence) is a A) Substitution cipher B) Vigenère cipher C) Shift cipher D) Transposition cipher Points Earned: 0.0/1.0 Correct Answer(s): A 13.
Recommended publications
  • Omegakey Manage Your Device at the Management Module
    Welcome to use our latest version of Lost Mode How to Start to Use it Bluetooth tracker. Detect the distance between the device and Bluetooth Tracker module your phone under the lost mode .Turn on the Step 1: Download the latest version App(version 1.6.0) from Apple App store. omegakey Manage your device at the management module. alarm at alert whether the device is lost, there Step 2: Open the Bluetooth and App. are two levels of lost alarm mode. Select the Thank you for purchasing omegakey Freely set and remove your device here. Step 3: Tap the Beacon for 3-5 times on hard surface, and the Beacon will be connectable when you Double-click the “call” button to find your device. alarm mode you want from the device. Phone hear a buzz. alarm, and both ends alarm. Step 4: Click the Beacon in the App which you want to configure and enter a name to connect it. Step 5: Now, you can configure and use the Beacon normally. NEXT Note: If you're having trouble with the Bluetooth, we recommend you completely remove the battery from the unit for 10 sec and reinsert it. There are many apps you can download some are better than others, we have linked just click on the apple / android icons on the first page Once you have selected the app you like download it and follow the on screen instructions ATTACH BLUETOOTH BEACON EXTERNALLY FOR MAX PERFORMANCE Found mode More View the alarm location or item's last location Find the device under the find mode according p.s make sure your Bluetooth is on and your phone is compatible with 4.0 Bluetooth to the strength of the signal.
    [Show full text]
  • A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes
    A Future-Focused Forensic Imager Designed to Streamline Evidence Collection Processes Extremely fast forensic imaging speed surpassing 50GB/min. Clone PCIe to PCIe at speeds above 90GB/min Image to/from Thunderbolt™ 3/USB-C external storage enclosures with an optional I/O card. Image and verify from up to 5 source drives up to 9 destinations simultaneously Create a logical image to capture only specific files needed Concurrent Image+Verify greatly reduces duration of image plus verification process Two 10GbE connections provide fast network imaging performance Network capture feature to capture network traffic, VOIP, internet activity Multi-task. Image from multiple sources simultaneously FEATURES n The Falcon®-NEO achieves imaging speeds when imaging directly to large capacity Thunder- n Image from a Mac® computer with USB-C ports surpassing 50GB/min and can clone PCIe to PCIe bolt 3 RAID storage enclosures for evidence data using a USB-C to USB-A cable and Target Disk at speeds at over 90GB/min. collection. The card connects to the Falcon-NEO’s Mode or use Logicube’s USB boot device to n Image and verify to multiple image formats; 2 write-blocked source I/O ports or 1 destination I/O image a source drive from a Mac computer on the native copy, .dd, dmg, e01 and ex01. The Falcon- port. The I/O card does not currently support imaging same network without booting the Mac computer’s ® NEO provides MD5, SHA1, SHA256, and dual hash in TDM from Mac systems, refer to the Falcon-NEO native OS. The Falcon-NEO supports imaging from ® authentication at extremely fast speeds.
    [Show full text]
  • Mobiflage: Deniable Storage Encryption for Mobile Devices 3
    TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Mobiflage: Deniable Storage Encryption for Mobile Devices Adam Skillen and Mohammad Mannan Abstract—Data confidentiality can be effectively preserved through encryption. In certain situations, this is inadequate, as users may be coerced into disclosing their decryption keys. Steganographic techniques and deniable encryption algorithms have been devised to hide the very existence of encrypted data. We examine the feasibility and efficacy of deniable encryption for mobile devices. To address obstacles that can compromise plausibly deniable encryption (PDE) in a mobile environment, we design a system called Mobiflage. Mobiflage enables PDE on mobile devices by hiding encrypted volumes within random data in a devices free storage space. We leverage lessons learned from deniable encryption in the desktop environment, and design new countermeasures for threats specific to mobile systems. We provide two implementations for the Android OS, to assess the feasibility and performance of Mobiflage on different hardware profiles. MF-SD is designed for use on devices with FAT32 removable SD cards. Our MF-MTP variant supports devices that instead share a single internal partition for both apps and user accessible data. MF-MTP leverages certain Ext4 file system mechanisms and uses an adjusted data-block allocator. These new techniques for storing hidden volumes in Ext4 file systems can also be applied to other file systems to enable deniable encryption for desktop OSes and other mobile platforms. Index Terms—File system security, Mobile platform security, Storage Encryption, Deniable encryption ✦ 1 INTRODUCTION AND MOTIVATION plaintext can be recovered by decrypting with the true key. In the event that a ciphertext is intercepted, and the Smartphones and other mobile computing devices are user is coerced into revealing the key, she may instead being widely adopted globally.
    [Show full text]
  • Deep Web for Journalists: Comms, Counter-Surveillance, Search
    Deep Web for Journalists: Comms, Counter-surveillance, Search Special Complimentary Edition for Delegates attending the 28th World Congress of the International Federation of Journalists * By Alan Pearce Edited by Sarah Horner * © Alan Pearce June 2013 www.deepwebguides.com Table of Contents Introduction by the International Federation of Journalists A Dangerous Digital World What is the Deep Web and why is it useful to Journalists? How Intelligence Gathering Works How this affects Journalists 1 SECURITY ALERT . Setting up Defenses 2 Accessing Hidden Networks . Using Tor . Entry Points 3 Secure Communications . Email . Scramble Calls . Secret Messaging . Private Messaging . Deep Chat . Deep Social Networks 4 Concealed Carry 5 Hiding Things . Transferring Secret Data . Hosting, Storing and Sharing . Encryption . Steganography – hiding things inside things 6 Smartphones . Counter-Intrusion . 007 Apps 7 IP Cameras 8 Keeping out the Spies . Recommended Free Programs . Cleaning Up . Erasing History . Alternative Software Share the Knowledge About the Authors Foreword by the International Federation of Journalists Navigating the Dangerous Cyber Jungle Online media safety is of the highest importance to the International Federation of Journalists. After all, the victims are often our members. The IFJ is the world’s largest organization of journalists and our focus is on ways and means to stop physical attacks, harassment and the killing of journalists and media staff. In an age where journalism – like everything else in modern life – is dominated by the Internet, online safety is emerging as a new front. In this new war, repressive regimes now keep a prying eye on what journalists say, write and film. They want to monitor contacts and they want to suppress information.
    [Show full text]
  • Mobigyges: a Mobile Hidden Volume for Preventing Data Loss, Improving Storage Utilization, and Avoiding Device Reboot
    MobiGyges: A Mobile Hidden Volume for Preventing Data Loss, Improving Storage Utilization, and Avoiding Device Reboot Wendi Fenga, Chuanchang Liua, Zehua Guob,c, Thar Bakerd, Gang Wangb,c, Meng Wanga, Bo Chenga, and Junliang Chena aBeijing University of Posts and Telecommunications, 10 Xitucheng RD, 100876, Beijing, China bBeijing Institute of Technology, 5 Zhongguancun ST South, 100081, Beijing, China cUniversity of Minnesota Twin Cities, 117 Pleasant ST, 55455, Minneapolis, USA dLiverpool John Moores University, James Parson Building, Liverpool, L3 3AF, UK Abstract Sensitive data protection is essential for mobile users. Plausibly Deniable Encryption (PDE) systems provide an effective manner to protect sensitive data by hiding them on the device. However, existing PDE systems can lose data due to overriding the hidden volume, waste physical storage because of the \reserved area" used for avoiding data loss, and require device reboot when using the hidden volume. This paper presents MobiGyges, a hidden volume based mobile PDE system, to fill the gap. MobiGyges addresses the problem of data loss by restricting each storage block used only by one volume, and it improves storage utilization by eliminating the \reserved area". MobiGyges can also avoid device reboot by mounting the hidden volume dynamically on-demand with the Dynamic Mounting service. Moreover, we identify two novel PDE oriented attacks, the capacity comparison attack and the fill-to-full attack. MobiGyges can defend them by jointly leveraging the Shrunk U-disk method and multi-level deniability. We implement the MobiGyges proof-of-concept system on a real mobile phone Google Nexus 6P with LineageOS 13. Experimental results show that MobiGyges prevents data loss, avoids device reboot, improves storage utilization by over 30% with acceptable performance overhead compared with current works.
    [Show full text]
  • Or As I Like to Call It, Occult Computing Adrian Crenshaw
    Or as I like to call it, Occult Computing Adrian Crenshaw http://Irongeek.com I run Irongeek.com I have an interest in InfoSec education I don’t know everything - I’m just a geek with time on my hands http://Irongeek.com Occult comes from the Latin word occultus (clandestine, hidden, secret), referring to "knowledge of the hidden". Forensic: Relating to the use of science and technology in the investigation and establishment of facts or evidence in a court of law. Since hiding activities is what we are doing, Occult Computing seems like a good name. Since people are not necessarily hiding their activities from a court of law, the term anti-forensics may not apply. Occult Computing sounds cooler than Anti-forensics Cthulhu fhtagn http://Irongeek.com Thanks to Wikipedia and Wiktionary for wording of definitions Why: Not about just hiding your stash from the Fuzz… Law/policy enforcement may find it useful to know how folks hide their computer activities Users may want to know how to hide their activities from invasive law/policy enforcement Companies may want to know how to clear boxes before donating them What: Mostly Windows, but most ideas are applicable to other operating systems Not going to cover malware analysis, nor network anti-forensics (at least not much) Mostly we will cover hiding tracks left on storage media http://Irongeek.com 1. Don’t leave tracks in the first place 2. Selective file removal and encryption tools 3. Parlor Tricks 4. Nuke it from orbit, it's the only way to be sure http://Irongeek.com Bow down before my Venn diagram of doom!!! If it’s not easy, folks won’t do it.
    [Show full text]
  • Comparison of Disk Encryption Software 1 Comparison of Disk Encryption Software
    Comparison of disk encryption software 1 Comparison of disk encryption software This is a technical feature comparison of different disk encryption software. Background information Name Developer First released Licensing Maintained? ArchiCrypt Live Softwaredevelopment Remus ArchiCrypt 1998 Proprietary Yes [1] BestCrypt Jetico 1993 Proprietary Yes BitArmor DataControl BitArmor Systems Inc. 2008-05 Proprietary Yes BitLocker Drive Encryption Microsoft 2006 Proprietary Yes Bloombase Keyparc Bloombase 2007 Proprietary Yes [2] CGD Roland C. Dowdeswell 2002-10-04 BSD Yes CenterTools DriveLock CenterTools 2008 Proprietary Yes [3][4][5] Check Point Full Disk Encryption Check Point Software Technologies Ltd 1999 Proprietary Yes [6] CrossCrypt Steven Scherrer 2004-02-10 GPL No Cryptainer Cypherix (Secure-Soft India) ? Proprietary Yes CryptArchiver WinEncrypt ? Proprietary Yes [7] cryptoloop ? 2003-07-02 GPL No cryptoMill SEAhawk Proprietary Yes Discryptor Cosect Ltd. 2008 Proprietary Yes DiskCryptor ntldr 2007 GPL Yes DISK Protect Becrypt Ltd 2001 Proprietary Yes [8] cryptsetup/dmsetup Christophe Saout 2004-03-11 GPL Yes [9] dm-crypt/LUKS Clemens Fruhwirth (LUKS) 2005-02-05 GPL Yes DriveCrypt SecurStar GmbH 2001 Proprietary Yes DriveSentry GoAnywhere 2 DriveSentry 2008 Proprietary Yes [10] E4M Paul Le Roux 1998-12-18 Open source No e-Capsule Private Safe EISST Ltd. 2005 Proprietary Yes Dustin Kirkland, Tyler Hicks, (formerly [11] eCryptfs 2005 GPL Yes Mike Halcrow) FileVault Apple Inc. 2003-10-24 Proprietary Yes FileVault 2 Apple Inc. 2011-7-20 Proprietary
    [Show full text]
  • A New Standard in Digital Forensics
    A New Standard in Digital Forensics Extremely fast forensic imaging at over 30GB/min* Image and verify from 4 source drives to 5 destinations Write-blocked preview & triage of suspect drive contents Image to or from a network location Multi-task. Set Image, wipe, hash tasks to run concurrently Targeted Imaging feature allows you to create a logical image using pre-set, custom filters, file signature filters and/or keyword search to capture only specific files needed Supports PCIe SSDs (M.2 SATA/AHCI/NVME type) with optional adapters Without exception, the most technologically advanced forensic imaging solution available. Blazing fast performance, feature-packed, and designed to meet future technology advances, the Falcon sets a new standard of excellence in digital forensic imaging solutions. FEATURES ­n The Falcon is blazing fast with imaging speeds of ­n Built-in support for SAS/SATA/USB3/FireWire n Write-blocked preview/triage hard drive contents. over 30GB/min* storage devices. Adapters are included with Use the Falcon as a write-blocker. The file browser ­n Image and verify to multiple image formats; Falcon to support 1.8”/2.5”/3.5”/1.8” ZIF IDE and feature provides write-blocked access to source or native copy, dd image, e01, ex01 and file-based microSATA drive interfaces. Optional adapters are destination drives connected to Falcon. View the copy. Compression available for E01/Ex01 available for eSATA, mSATA and compact flash drive’s partitions and contents and view text files, formats. Uses SHA1, SHA256, MD5 and dual-hash drives. An optional SCSI module provides support jpeg, PDF, XML, or HTML files.
    [Show full text]
  • Falcon®-NEO User's Manual
    Falcon®-NEO User’s Manual Logicube, Inc. Chatsworth, CA 91311 USA Phone: 818 700 8488 Fax: 818 700 8466 Version: 3.2u1 Date: 10/22/2020 MAN-FALCON-NEO Logicube Falcon®-NEO User’s Manual I Limitation of Liability and Warranty Information Logicube Disclaimer LOGICUBE IS NOT LIABLE FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO PROPERTY DAMAGE, LOSS OF TIME OR DATA FROM USE OF A LOGICUBE PRODUCT, OR ANY OTHER DAMAGES RESULTING FROM PRODUCT MALFUNCTION OR FAILURE OF (INCLUDING WITHOUT LIMITATION, THOSE RESULTING FROM: (1) RELIANCE ON THE MATERIALS PRESENTED, (2) COSTS OF REPLACEMENT GOODS, (3) LOSS OF USE, DATA OR PROFITS, (4) DELAYS OR BUSINESS INTERRUPTIONS, (5) AND ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE (OR FROM DELAYS IN SERVICING OR INABILITY TO RENDER SERVICE ON ANY) LOGICUBE PRODUCT. LOGICUBE MAKES EVERY EFFORT TO ENSURE PROPER OPERATION OF ALL PRODUCTS. HOWEVER, THE CUSTOMER IS RESPONSIBLE TO VERIFY THAT THE OUTPUT OF LOGICUBE PRODUCT MEETS THE CUSTOMER’S QUALITY REQUIREMENT. THE CUSTOMER FURTHER ACKNOWLEDGES THAT IMPROPER OPERATION OF LOGICUBE PRODUCT AND/OR SOFTWARE, OR HARDWARE PROBLEMS, CAN CAUSE LOSS OF DATA, DEFECTIVE FORMATTING, OR DATA LOADING. LOGICUBE WILL MAKE EFFORTS TO SOLVE OR REPAIR ANY PROBLEMS IDENTIFIED BY CUSTOMER, EITHER UNDER WARRANTY OR ON A TIME AND MATERIALS BASIS. Warranty DISCLAIMER IMPORTANT - PLEASE READ THE TERMS OF THIS AGREEMENT CAREFULLY. BY INSTALLING OR USING LOGICUBE PRODUCTS, YOU AGREE TO BE BOUND BY THIS AGREEMENT. IN NO EVENT WILL LOGICUBE BE LIABLE (WHETHER UNDER THIS AGREEMENT, RESULTING FROM THE PERFORMANCE OR USE OF LOGICUBE PRODUCTS, OR OTHERWISE) FOR ANY AMOUNTS REPRESENTING LOSS OF PROFITS, LOSS OR INACCURACY OF DATA, LOSS OR DELAYS OF BUSINESS, LOSS OF TIME, COSTS OF PROCUREMENT OF SUBSTITUTE GOODS, SERVICES, OR TECHNOLOGY, PROPERTY DAMAGE, OR INDIRECT, CONSEQUENTIAL, OR PUNITIVE DAMAGES OF A PURCHASER OR USER OF LOGICUBE PRODUCTS OR ANY THIRD PARTY.
    [Show full text]
  • Anti-Virus - Backup - Encryption - File System - Forensics Media - Networking - Office - Password Recovery Pen-Testing - Registry - System - Utilities
    Katana Tool Kit: Portable Applications Anti-Virus - Backup - Encryption - File System - Forensics Media - Networking - Office - Password Recovery Pen-Testing - Registry - System - Utilities Portable applications are those which do not require installation on a system to be executed. They can be run directly from an external device allowing you to bring all your favorite applications around with you on one drive. The Katana Tool Kit comes preconfigured with over a hundred portable applications. Anti-Virus ClamAV 0.96 ClamWin Portable is the popular ClamWin antivirus packaged as a portable app, so you can take your antivirus with you to scan files on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind. SpyDLLRemover 3.2 SpyDLLRemover is the standalone tool to effectively detect and delete spywares from the system. It comes with advanced spyware scanner which quickly discovers hidden Rootkit processes as well suspcious/injected DLLs within all running processes. StreamArmor 1 StreamArmor is the sophisticated tool for discovering hidden alternate data streams (ADS) as well as clean them completely from the system. It's advanced auto analysis coupled with online threat verification mechanism makes it the best tool available in the market for eradicating the evil streams. StreamArmor comes with fast multi threaded ADS scanner which can recursively scan over entire system and quickly uncover all hidden streams. Backup Unstoppable Copier 4.4 Unstoppable Copier is a Free Portable tool that allows you to recover files from hard drives, flash drives, CDs/DVDs and other media disks that have physical damage or are starting to go bad.
    [Show full text]
  • Artifice: a Deniable Steganographic File System
    Artifice: A Deniable Steganographic File System Austen Barker Staunton Sample Yash Gupta Anastasia McTaggart Ethan L. Miller Darrell D. E. Long University of California, Santa Cruz Abstract nations and law enforcement to legally obligate disclosure of The challenge of deniability for sensitive data can be a life encryption keys [24]. or death issue depending on location. Plausible deniability Since carrying encrypted files or dedicated hardware is in- directly impacts groups such as democracy advocates relay- herently suspicious, a deniable storage system must co-exist ing information in repressive regimes, journalists covering with an open public file system to maintain plausible de- human rights stories in a war zone, and NGO workers hid- niability. It is highly suspicious if there are visible drivers ing food shipment schedules from violent militias. All of or firmware, unconventional partitioning schemes, unusable these users would benefit from a plausibly deniable data stor- space in a file system, or unexplained changes to disk free age system. Previous deniable storage solutions only offer space. The hidden file system must therefore operate in such pieces of an implementable solution. Artifice is the first tun- a way that the encapsulating file system and operating system able, operationally secure, self repairing, and fully deniable are unaware of the hidden file system’s existence, even when steganographic file system. faced with a detailed forensic examination. A deniable sys- Artifice operates through the use of a virtual block device tem must therefore meet four requirements: effectively hide driver stored separately from the hidden data. It uses external existence of the data, disguise hidden data accesses, have no entropy sources and erasure codes to deniably and reliably impact on the behavior of the public system, and hide the store data within the unallocated space of an existing file software used to access the hidden data.
    [Show full text]
  • Delineation of Trivial PGP Security
    IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 20, Issue 3, Ver. I (May. - June. 2018), PP 17-23 www.iosrjournals.org Delineation of Trivial PGP Security Mr. Nikhil Joshi1, Mr. Gaurav Kumar2, 3 Prof. Divya Premchandran Asst Professor , 1mca Student, Bvimit Cbd Belapur, Navi Mumbai. 2mca Student, Bvimit Cbd Belapur, Navi Mumbai. 3mca Bvimit Cbd Belapur, Navi Mumbai. Corresponding Author:Mr. Nikhil Joshi Abstract: The enhanced PGP Security that we are proposing is based only for digital signatures & encryption/decryption of the messages. The algorithm that is used here consists of asymmetric algorithm as RSA 4096 & the symmetric algorithm used is AES-256(Advance Encryption standard). Also we require hashing function in order to secure the digital signature as well as messages. Hence we use Whirlpool hashing function which is open source & is based on 512 block cipher that makes the application more powerful than the previously used. Keywords: -Asymmetry algorithm, AES-256, Digital Signature, Hash Function, OpenPGP , PGP, RSA 4096, Rijndael Cipher, SHA-256, Symmetric algorithm, Whirlpool. -------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 07-05-2018 Date of acceptance: 26-05-2018 ----------------------------------------------------------------------------------------------------------------------------- ---------- I. Introduction The process of creating & maintaining digitalsignature along with encryption/decryption of messages is widely known & used in PGP. Various symmetric algorithms like DES, Triple DES, Twofish & IDEA along with hashing functions like MD5, SHA-1, SHA-256 has been introduced to provide a stronger encryption technique. The key exchange policy RSA 4096 is still considered the best asymmetric algorithm so far. Although being so strong in their encryption technique it is still slower & weaker compared to the newly concept that we are going to introduce is AES-256 & Whirlpool.
    [Show full text]