CyberSafe

CyberSafe is a series of data-encryption software programs offering hidden files and folders encryption signing, open-source disk encryption, and public-key infrastructure encryption. It is offered in three formats: Top Secret, Disk Encryption, and Files Encryption. contain “hidden folders” and “protected files icons” that indicate where secured files are located. They are used to prevent critical files from being deleted or modified by users. They are vulnerable because it is obvious a computer with those folders and icons have hidden data. Top Secret uses a driver called a “hook” to hide protected files and folders. The files are also encrypted once they remain hidden. Through algorithms like RSA, signing uses a “hash” - a collection of key value pairs - with a private key that decodes information after it is verified by the public key. RSA is a public key cryptography system patented by Ronald L. Rivest, Leonard M. Adelman, and Adi Shamir. The name RSA stems from the initials of the researchers’ first names. S/MIME uses RSA to transmit emails securely. It stores data in buckets that can be read, used, or modified by users. Virtual volumes include database and storage pool backups, as well as data that can be transferred through EXPORT and IMPORT commands. On-the-fly encrypted military-based volumes, such as the tool created by CyberSafe, are based on a 448-bit cipher.
Skype Chat Encryption
Skype is an online system that allows individuals and businesses to communicate via the Internet with phone calls, video chats, and instant messaging. Since vast amounts of data flow through Skype on a daily basis, safety and security is a paramount concern. A public key infrastructure (PKI) serves as a basis for encryption of Skype chat sessions through CyberSafe software. It can be used to assure the quality of electronic information as well as the privacy of the information as it is transmitted between users.
Whole disk encryption
According to Technopedia, , also called full disk encryption, is the “encryption of all the data on a disk drive, including the program that encrypts the bootable operating system CyberSafe Disk Encryption includes a whole disk encryption feature. According to Murdoch Mactaggert, “symmetric cryptography has been used for thousands of years.” Asymmetric cryptography relies on trapdoor functions; they simplify moving from a domain to a range and vice versa using “a special string called a trapdoor.” Stanford researchers Whitfield Duffie and Martie E. Hellman are credited with publicly publishing the first paper describing the idea of asymmetric cryptography in 1977.
Files Encryption Automatic Modes
*For official use: This automatic mode of files encryption uses EFS (Encrypting File System) and its cipher is 3DES 192 bits (Data Encryption Standard). DES is a symmetric cipher.
*Secret: This automatic mode uses public key infrastructure to encrypt files and then hide them. The cipher is AES 256 bits (Advanced Encryption Standard).
*Top secret: According to CyberSafe, this automatic mode “encrypts files and data with the use of a password, which is taken from the value of the private key by default for MS CSP and then hides them.”
In addition to 3DES, AES, and Blowfish, Cypersafe offers a variety of encryption tools and algorithms, such as OpenPGP, Crypto-Pro (GOST certified), and encrypted zip.
 
< Prev   Next >