Comp Security Lab 1
Comp Security Lab 1
Lab 1
Tutor: Kevin Johnson
Rojay Beharie 1601922
Activity 1.
VeraCrypt: VeraCrypt is a free open source software used for disk encryption. Its main features are that it is
capable of creating a virtual encrypted disk within a file and mounting it as a real disk, can encrypt an entire
storage device (such as a hard drive or flash drive) and is able to encrypt a partition or drive where the OS
is installed. In the screenshot below, the options to perform these features can be seen as follows:
VeraCrypt is most suitable for use when one wishes to not only encrypt regular day to day files (such as
word documents, folders, etc) but also highly important storage areas such as an entire hard drive or flash
drive.
AxCrypt: Axcrypt is an easy to use encryption software that comes with many features to cater to the needs
of the average user. Its main features are a password management feature that allows users to store and
organize their numerous passwords in a safe environment, a password generator that creates incredibly
strong passwords that the user may use when creating accounts online and AES-128 bit and AES-256 bit
encryption standards.Cloud storage connection is also supported, which allows users to safely upload their
encrypted files to cloud storage services such as Dropbox and Google Drive. In the screenshot below the
UI of AxCrypt can be seen along with a list of folders that have been encrypted by the program:
AxCrypt is suitable for use in situations where a user is in need of an easy to use encryption software that
spans multiple platforms. The added password management features also add another dimension to the
usefulness and versatility of the program.
7-Zip: 7-Zip is a free file compression and encryption program. This program boasts a hoast of features
including a high compresson ratio, AES-256 encryption and an array of different encryption, compression
and conversion methods for a plethora of different file formats. The following screenshot shows the different
options that 7-Zip affords its users:
7-Zip is best used in situations where the user needs a program that is capable of carrying out file
encryption, conversion and compression in many different file formats.
CryptoExpert 8: CryptoExpert 8 is a program designed to provide secure data storage in the form of data
vaults. The program can secure vaults of unlimited size, and it uses Blowfish, Cast, 3DES and AES-
256 encryption algorithms. The following screenshot shows the trial version of CryptoExpert 8:
This software is most suited to conditions that require a program that can secure vast amounts of
data at once, as this is the main selling point of this program.
GNU Privacy Guard: GNU Privacy Guard is an open source, cross platform encryption software.
The program features a key management system and the ability to not only encrypt files and
folders, but also communication channels such as email. The following screenshot shows the
sleek UI of the GNU Privacy Guard and the various options available to the user:
This program is best suited for experienced users who need a program that offers email encryption
and thorough key management.
Activity 2.
From the given list of keyloggers, only 2 of them were detected by antivirus programs. These 2
were Kidlogger and REFOG. Kidlogger prompted the following reaction from Kapersky antivirus:
While REFOG prompted this response:
Spyrix and Actual did not illicit a response from Windows Defender nor from Kapersky, thus seem
more dangerous. In terms of maintaining anonymity, Spyrix seems to be the best as it allows the
user to remotely access the the information recorded by the keylogger thoguh the use of an online
account. By clicking on the “My Account” button below, a dashboard is opened in a browser
window that shows all the information recorded by the keylogger, thus the offending party does not
need to have access to the infected machine in order to see the information.