GROUP AD

Tools Introduction

Quick Introduction about our tools
Sub Topic 1 : email application

Proton Email

Proton Mail is a popular, privacy-focused email service based in Switzerland that uses end-to-end encryption (E2EE) and zero-access encryption to secure user messages, meaning only you can read your emails, not even Proton. It offers free and paid plans, providing an ad-free, tracker-free inbox with features like self-destructing messages, and is part of the broader Proton suite that includes VPN, Calendar, and Drive, all built on a commitment to privacy and Swiss law.
Key Features & How it Works
01

End-to-End Encryption (E2EE)

Emails between Proton Mail users are automatically encrypted on the sender's device and can only be decrypted by the intended recipient
02

Zero-Access Encryption

For emails received from non-Proton services (like Gmail), Proton immediately encrypts them upon arrival. This ensures that not even Proton can read your stored messages.
03

Password-Protected Emails

Users can send encrypted emails to non-Proton recipients by setting a password that the recipient must enter to view the message
Confidentiality, Integrity, and Availability (CIA) Analysis
Confidentiality
1. The messages exchanged between Proton users remain encrypted until your gadget or computer receives the message and then the subsequent messages are forwarded to the receiver.
2. Hide-my-email Aliases: Identity security allows you to use special Aliases to ensure that your actual email address will not be tracked by a third party.
INTEGRITY
1. Transparency: Proton apps are all open source and will be audited by third parties to confirm that there are no backdoors in the code.
2. Digital Signatures (PGP): Each email is cryptographically signed in order to verify that there has not been any manipulation of the content on its way to the receiver.
AVAILABILITY
1. Offline Mode (New 2025): You are able to read, search and compose emails without having an active internet connection in what is known as a major update.
2. Proton Sentinel: This is a sophisticated protection system which makes use of AI and 24/7 surveillance to avert account intrusions and unauthorized access
Sub Topic 2 : Encryption Tools

7-Zip 

The 7-Zip is a popular open-source file compression utility, which has a strong encryption feature. It also allows encryption of AES-256 that is a universally accepted and secure encryption standard. The 7-Zip program is easily used, freely available, and easy to install and is usually used by individuals and organizations to safeguard files and enhance the level of data security.
Key Features & How it Works
01

AES-256 Encryption

Use AES-256 encryption to secure files and folders with a password, preventing unauthorized access and ensuring data confidentiality
02

File Compression and Archiving

It compresses files into archive formats such as .7z and .zip, reducing file size and making storage and file sharing more efficient
03

Password Protection

Users can apply password protection to archived files, allowing only authorized users with the correct password to open or extract the contents.
Confidentiality, Integrity, and Availability (CIA) Analysis
Confidentiality
The 7-Zip provides confidentiality, which is achieved by encrypting files with the AES-256 encryption and password protection. This helps to avoid the infiltration of the file contents by wrong users without appropriate password.
INTEGRITY
The 7-Zip assists in the maintenance of data integrity, that is, the encrypted files can not be altered without any issue. Any unauthorized modifications to the encrypted archive will either cause failure in extraction or corrupted information.
AVAILABILITY
The availability supported by 7-Zip is that of the authorized users to access and extract the encrypted files at any time with the use of the
Sub Topic 3 : Remote Access

rustdesk

Remote Access can connect to computers or security systems remotely from any location. It aids businesses in system management, security monitoring, and prompt problem solving. RutDesk is a tool for remote access that offers safe and simple connections. It makes security management quicker and more effective by enabling IT teams to remotely monitor security tools, update systems, and troubleshoot issues.
Key Features & How it Works
01

Self-Hosting Option

Users can host their own ID and relay servers, ensuring full control and sovereignty over their data and connections. This is a major differentiator from many proprietary solutions and helps meet specific security or compliance requirements
02

End-to-End Encryption (E2EE)

All connections are secured with robust, end-to-end encryption protocols (based on NaCl) to ensure data confidentiality and integrity during remote sessions.
03

Cross-Platform Compatibility

RustDesk provides clients for multiple operating systems, including Windows, macOS, Linux, Android, and iOS, allowing users to access devices from a wide range of endpoints.
Confidentiality, Integrity, and Availability (CIA) Analysis
Confidentiality
RustDesk protects user data by using encrypted connections during remote access. This prevents other people from viewing the screen or data without permission. Only authorized users are allowed to connect to the system.
INTEGRITY
RustDesk ensures that data sent during a remote session is not changed. The encrypted connection helps prevent modification of commands and files. User login control also helps protect the system from unauthorized changes
AVAILABILITY
RustDesk allows users to access systems remotely at any time when an internet connection is available. It supports many operating systems, which makes it easy to use on different devices. Self-hosted servers help keep the service running without depending on external providers.
GROUP AD - BITS3423 INFORMATION TECHNOLOGY SECURITY