Skip to main content

Security Tool 1 (Encryption Tools) - Group C

    

 


1.0    Background of Encryption Tools

Encryption is a protection method that uses an internet-based algorithm key to obscure data from any unverified viewers. Encryption tools change the data during transfer so that individuals who see the data afterward can't understand or access it without the key. Once the data arrives at an intended destination, you can also use tools to decode messages so they're readable again.

For the encryption tool “LastPass”, it used to secure an account begins the moment it’s created. When a user creates their master password, it’s used to generate a unique encryption key, even when enabling passwordless login. The master password and the encryption key are never sent to or shared with LastPass.

1.1            Installation and demo manual

Get LastPass for free at the official website https://www.lastpass.com/

Create an Account

Add LastPass Chrome Extension

Dashboard of LastPass.

Try import password to LastPass.



Select google chrome icon to see how to import password.

Check the steps for importing password file.


From chrome browser, go to settings > autofill > password manager.


Click on export password.



A password csv file will be downloaded.



Upload the csv file to LastPass website.



Successfully imported password.


           1.2            
CIA (Confidentiality, Integrity, and Availability)
      • Confidentiality

LastPass’s user are protected through LastPass’ zero-knowledge security model. Zero-knowledge means that no one has access to user decrypted Master Password, vault, or vault data except the account owner. To ensure that only authorized access is granted to user vault, we use industry-standard mechanisms, such as AES-256 encryption and PBKDF2 hashing plus salting, to keep user Master Password safe. This is an industry standard that all password managers should adhere to.

      • Integrity

LastPass using different security product architecture to protect user data, which is private master password, end-point encryption, 256-bit AES encryption and PBKDF2-SHA256 for brute-force attacks. Private master password means LastPass does not send or store the master password and cannot access user account. End-point encryption is devised to allow only the user to decrypt and access their vault. Encryption happens exclusively at the device level, rather than on LastPass’ servers. Sensitive data is encrypted before being synced to LastPass for safe storage. Next, 256-bit AES encryption is an algorithm which widely accepted as impenetrable, it’s the same encryption type utilized by banks and the military. Last, PBKDF2-SHA256 for brute-force attacks PBKDF2 strengthens the master password and encryption key against largescale, brute-force attacks by increasing the amount of time it takes to make even one guess for a password. LastPass uses SHA-256 and performs 100,100 rounds of PBKDF2 to create the encryption key, before creating the user’s login hash. By slowing down brute force attacks, PBDKF2 makes it difficult to try cracking even just one master password.

      • Availability

LastPass is a free encryption tool for every user. It is also supported on Windows, Mac, Linux, and mobile platforms so all of the user’s data is stored in a centralized place and is accessible from anywhere, anytime. User can get the LastPass by add into browser extensions, desktop, and mobile application.

      • Authentication

LastPass’ multifactor authentication solves remote user authentication in a simple, user-friendly way which including passwordless login. Safely allow employees to access their work from anywhere while improving compliance regulations by adding MFA(Multifactor Authentication) to access points, including Password Vaults, Single Sign-on (SSO) Cloud Apps, VPNs, Workstations, Identity Providers, and LDAP/RADIUS On-Premises.

      • Access Control

LastPass can access control from anywhere. Users can enable passwordless login to the LastPass vault via the LastPass Authenticator App. With LastPass Authenticator, user will receive a push notification on their phone. Tapping “Accept” completes the authentication process, and LastPass grants access to user’s vault. Alternatively, user can type in the 6-digit code generated on the LastPass Authenticator app to finish authenticating.










  




Comments

Popular posts from this blog

Security Tool 3 (Email Application) - Group C

  3.1          Background Subtopic Electronic mail, commonly shortened to “email,” is a communication method that uses electronic devices to deliver messages across computer networks. "Email" refers to both the delivery system and individual messages that are sent and received. Email has existed in some form since the 1970s, when programmer Ray Tomlinson created a way to transmit messages between computer systems on the Advanced Research Projects Agency Network (ARPANET). Modern forms of email became available for widespread public use with the development of email client software (e.g. Outlook) and web browsers, the latter of which enables users to send and receive messages over the Internet using web-based email clients (e.g. Gmail). Gmail is a free web-based email service provided by Google. It allows users to send and receive e-mail over the Internet. It provides 15 GB of storage which is shared across Gmail, Google Drive, and Google Photos for each Google account. It als

Analysis On CIA Between The Selected Tools - Group C

  LastPass (Encryption Tool) Mini Tool (Data Recovery Tool) Email (Email Application) Confidentiality LastPass’s user are protected through LastPass’ zero-knowledge security model. Zero-knowledge means that no one has access to user decrypted Master Password, vault, or vault data except the account owner. To ensure that only authorized access is granted to user vault, we use industry-standard mechanisms, such as AES-256 encryption and PBKDF2 hashing plus salting, to keep user Master Password safe. This is an industry standard that all password managers should adhere to. MiniTool Power Data Recovery cannot just simply recover the disks or files that is encrypted with data protection feature such as BitLocker. Only the user knows or possess the password for the BitLocker encryption. This is to ensure that only the users of that particular drive or files can have access and recovers the lost f