SlideShare a Scribd company logo
Q.1 Identifywhat Taming Sari EncryptionSoftwaredoes. Youmay listdown all its
features.
Taming Sari software is used to protect the confidentiality of your files and data. It is
based on 2 factor authentication of cryptographic algorithm. It has many features but
some of the key factors of taming Sari encryption Software are:
 Strong encryption by using MySEAL approved algorithms
 Safe environment of file sharing
 Encrypted conversation
 It monitors files too
 Quick encryption and decryption process
 It runs on both Mac and on windows OS
 2 Factor authentication
 Not easy password exchange
Q.2 The software enables you to share the encryptedfile with other people, by
just specifying the recipient’s email address during the encryptionprocedure. It
uses a concept called Digital Envelope. The sender does not have to inform the
recipient of the file, what is the encryptionkey that he/she used to encrypt the
file. Investigate, how is this possible. Explain the possible steps.
It is considered to be the strength of Taming Sari Encryption Software. Key management
in Taming Sari is done in the advanced cryptographic algorithms. The encryption keys of
Taming Sari users are never stored on the Taming Sari server. They're created with 256-
bit length and safeguarded at the user's device using Taming Sari's superior risk
management.
Furthermore, if a user desires to share a secured file with another person, there is no
need for the user to provide the secret key used during the encryption procedure to the
recipient. Taming Sari's smart and secure Key Management handles it.
True Random numbers 256 bits buffer of random bits generated. Each time PGP expects
a keystroke from the user and it records.
Q.3 Basedon your finding above, do you think Taming Sari implements a secure
encryption protocol? Justify your answer
Yes, based on my above findings I have come to the point that Taming sari implements a
secure encryption protocol. It is very beneficial to use for the data security. Its randomly
generation of 256 bits key system make it mor secure and very much difficult to breach.
And all of the above it is very easy to use.
Q.4 Based on your usage of Taming Sari, do you find out any weakness of the
system? If yes, please describe the weakness. Otherwise, identify its strength.
I did not find any weakness by the usage of Taming Sari but I think the trail version of the
software would have to add more users and some more fields should have to be explored
before shifting to the subscribed version of Taming Sari Encryption Software. Otherwise I
found it very strong and encrypted software. Easy to select and protect files or type your
confidential conversation test later share your protected files or confidential conversation
with authorizes parties. There is also a tracking system available to monitor data it help
in tracking of any data leakage. Key system is very much strong and it is 2 step verification
based.
Q.5 Identify, what are the possible cryptographic algorithmsusedinTaming Sari.
State its functionality too
Standard symmetric encryption algorithms include RC4, AES, DES, 3DES, and QUAD.
Standard asymmetric encryption algorithms include RSA, Diffie-Hellman, ECC, El Gamal,
and DSA. Both data in transit and data at rest can be kept confidential and secure using
cryptography. It can also guard against repudiation by authenticating senders and
recipients. Many endpoints, often multiple clients, and one or more back-end servers are
common in software systems.
Q.6 The software implements 2 Factor Authentication. Describe what factor it
implements, and does it improve the security of Taming Sari? Explain your
answer.
Two-factor authentication (2FA) is a security solution that requires two different forms of
identity to gain access to something. A password is the first factor, and the second is
usually a text message with a code sent to your smartphone, or biometrics utilizing your
fingerprint, face, or retina.
Q.7Statewhetherdoyou likeusingTaming SariEncryptionSoftware,andreasons
to your answer.
Yes, I like using Taming Sari encryption software the reason is its too much secure and its
key system is tremendously impressive. It gives Protection of valuable information
Security for user. It controls access, protects data, protects the system from viruses and
network/Internet breaches, and protects against other system-level security threats.
Q.8 Basedon your knowledgethat youhave gainedfrom Cryptographyand other
security classes;howdo you want to improve Taming Sari Encryption Software?
Confidentiality − Encryption technique can guard the information and communication
from unauthorized revelation and access of information.
Authentication − The cryptographic techniques such as MAC and digital signatures can
protect information against spoofing and forgeries.
Hashing algorithms and message digests are used in cryptography to maintain data
integrity. The receiver is ensured that the data received has not been tampered with
during transmission by giving codes and digital keys to confirm that what is received is
legitimate and from the intended sender.
So that is why I think Taming Sari is best in its own encryption software competition it.

More Related Content

PPTX
Internet safety and you
PDF
Network Security - Defense Through Layered Information Security
PDF
Cisa ransomware guide
PPT
Software Security Testing
PPTX
Distribution Industry: What is Ransomware and How Does it Work?
PPTX
Introduction to Network Security
PDF
Chapter 3, Data Protection vs Ransomware
PPT
Web Security and Network Security
Internet safety and you
Network Security - Defense Through Layered Information Security
Cisa ransomware guide
Software Security Testing
Distribution Industry: What is Ransomware and How Does it Work?
Introduction to Network Security
Chapter 3, Data Protection vs Ransomware
Web Security and Network Security

What's hot (20)

PDF
Email Security Overview
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
PDF
Elementary-Information-Security-Practices
PDF
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
PPTX
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
PPTX
Web server security challenges
PDF
SMB Network Security Checklist
PPTX
How to Recover from a Ransomware Disaster
PPTX
Anatomy of a Ransomware Event
PPTX
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
PPTX
Most Common Application Level Attacks
PPTX
Encryption by fastech
PPT
Web Security
PDF
3 reasons your business can't ignore Two-Factor Authentication
PDF
Arbel Zinger | Microsoft Advanced Threat Analytics
PPT
Webhawk as-software
PPTX
Database Threats - Information System Security
DOCX
Sanjoy debnath resume
PDF
IEEE NETWORKING PROJECT TITLE 2015-16
Email Security Overview
Application Security | Application Security Tutorial | Cyber Security Certifi...
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
Elementary-Information-Security-Practices
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Web server security challenges
SMB Network Security Checklist
How to Recover from a Ransomware Disaster
Anatomy of a Ransomware Event
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Most Common Application Level Attacks
Encryption by fastech
Web Security
3 reasons your business can't ignore Two-Factor Authentication
Arbel Zinger | Microsoft Advanced Threat Analytics
Webhawk as-software
Database Threats - Information System Security
Sanjoy debnath resume
IEEE NETWORKING PROJECT TITLE 2015-16
Ad

Similar to assign3.docx (20)

DOCX
Securing data at rest with encryption
PDF
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
PDF
IRJET- Password Management Kit for Secure Authentication
PPT
Survey Presentation About Application Security
PDF
Network Security
PPTX
Encryption-Decryption of Email
PPTX
6 Biggest Cyber Security Risks and How You Can Fight Back
PPTX
How To Plan Successful Encryption Strategy
PDF
Top 50 Cybersecurity Interview Questions-2.pdf
PPTX
You may be compliant...
PPTX
You may be compliant, but are you really secure?
PDF
Two Aspect Endorsement Access Control for web Based Cloud Computing
PDF
INTERVIEW QUESTION FOR IT AUDITOR
DOCX
Security technology
PPTX
Security Testing In The Secured World
PDF
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
PPTX
Chapter 2 System Security.pptx
PPTX
Security engineering 101 when good design & security work together
DOCX
Final Project – Incident Response Exercise SAMPLE.docx
PPTX
Top Network Security Interview Questions That You Should Know.pptx
Securing data at rest with encryption
Kebocoran Data_ Tindakan Hacker atau Kriminal_ Bagaimana kita mengantisipasi...
IRJET- Password Management Kit for Secure Authentication
Survey Presentation About Application Security
Network Security
Encryption-Decryption of Email
6 Biggest Cyber Security Risks and How You Can Fight Back
How To Plan Successful Encryption Strategy
Top 50 Cybersecurity Interview Questions-2.pdf
You may be compliant...
You may be compliant, but are you really secure?
Two Aspect Endorsement Access Control for web Based Cloud Computing
INTERVIEW QUESTION FOR IT AUDITOR
Security technology
Security Testing In The Secured World
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Chapter 2 System Security.pptx
Security engineering 101 when good design & security work together
Final Project – Incident Response Exercise SAMPLE.docx
Top Network Security Interview Questions That You Should Know.pptx
Ad

Recently uploaded (20)

PDF
Volvo EC290C NL EC290CNL engine Manual.pdf
PPTX
Small Fleets, Big Change: Overcoming Obstacles in the Transition to MHD Elect...
PPTX
Lecture 3b C Library xnxjxjxjxkx_ ESP32.pptx
PPTX
Cloud_Computing_ppt[1].pptx132EQ342RRRRR1
PPTX
Advance Module FI 160.pptx para pulsaar 160 y su sistema de encencido
PDF
Volvo ec17c specs Service Manual Download
PDF
Volvo EC290C NL EC290CNL Hydraulic Excavator Specs Manual.pdf
PDF
Lubrication system for Automotive technologies
PDF
EC290C NL EC290CNL Volvo excavator specs.pdf
PPTX
deforestation.ppt[1]bestpptondeforestation.pptx
PPTX
Zeem: Transition Your Fleet, Seamlessly by Margaret Boelter
PPTX
UNIT-2(B) Organisavtional Appraisal.pptx
PPTX
Small Fleets, Big Change: Market Acceleration by Niki Okuk
PPT
ACCOMPLISHMENT REPOERTS AND FILE OF GRADE 12 2021.ppt
DOCX
lp of food hygiene.docxvvvvvvvvvvvvvvvvvvvvvvv
PPTX
internal combustion engine renewable new
PPTX
description of motor equipments and its process.pptx
PPTX
Dipak Presentation final 18 05 2018.pptx
PDF
Journal Meraj.pdfuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
PDF
Volvo EC20C Excavator Step-by-step Maintenance Instructions pdf
Volvo EC290C NL EC290CNL engine Manual.pdf
Small Fleets, Big Change: Overcoming Obstacles in the Transition to MHD Elect...
Lecture 3b C Library xnxjxjxjxkx_ ESP32.pptx
Cloud_Computing_ppt[1].pptx132EQ342RRRRR1
Advance Module FI 160.pptx para pulsaar 160 y su sistema de encencido
Volvo ec17c specs Service Manual Download
Volvo EC290C NL EC290CNL Hydraulic Excavator Specs Manual.pdf
Lubrication system for Automotive technologies
EC290C NL EC290CNL Volvo excavator specs.pdf
deforestation.ppt[1]bestpptondeforestation.pptx
Zeem: Transition Your Fleet, Seamlessly by Margaret Boelter
UNIT-2(B) Organisavtional Appraisal.pptx
Small Fleets, Big Change: Market Acceleration by Niki Okuk
ACCOMPLISHMENT REPOERTS AND FILE OF GRADE 12 2021.ppt
lp of food hygiene.docxvvvvvvvvvvvvvvvvvvvvvvv
internal combustion engine renewable new
description of motor equipments and its process.pptx
Dipak Presentation final 18 05 2018.pptx
Journal Meraj.pdfuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
Volvo EC20C Excavator Step-by-step Maintenance Instructions pdf

assign3.docx

  • 1. Q.1 Identifywhat Taming Sari EncryptionSoftwaredoes. Youmay listdown all its features. Taming Sari software is used to protect the confidentiality of your files and data. It is based on 2 factor authentication of cryptographic algorithm. It has many features but some of the key factors of taming Sari encryption Software are:  Strong encryption by using MySEAL approved algorithms  Safe environment of file sharing  Encrypted conversation  It monitors files too  Quick encryption and decryption process  It runs on both Mac and on windows OS  2 Factor authentication  Not easy password exchange Q.2 The software enables you to share the encryptedfile with other people, by just specifying the recipient’s email address during the encryptionprocedure. It uses a concept called Digital Envelope. The sender does not have to inform the recipient of the file, what is the encryptionkey that he/she used to encrypt the file. Investigate, how is this possible. Explain the possible steps. It is considered to be the strength of Taming Sari Encryption Software. Key management in Taming Sari is done in the advanced cryptographic algorithms. The encryption keys of Taming Sari users are never stored on the Taming Sari server. They're created with 256- bit length and safeguarded at the user's device using Taming Sari's superior risk management. Furthermore, if a user desires to share a secured file with another person, there is no need for the user to provide the secret key used during the encryption procedure to the recipient. Taming Sari's smart and secure Key Management handles it.
  • 2. True Random numbers 256 bits buffer of random bits generated. Each time PGP expects a keystroke from the user and it records.
  • 3. Q.3 Basedon your finding above, do you think Taming Sari implements a secure encryption protocol? Justify your answer Yes, based on my above findings I have come to the point that Taming sari implements a secure encryption protocol. It is very beneficial to use for the data security. Its randomly generation of 256 bits key system make it mor secure and very much difficult to breach. And all of the above it is very easy to use. Q.4 Based on your usage of Taming Sari, do you find out any weakness of the system? If yes, please describe the weakness. Otherwise, identify its strength. I did not find any weakness by the usage of Taming Sari but I think the trail version of the software would have to add more users and some more fields should have to be explored before shifting to the subscribed version of Taming Sari Encryption Software. Otherwise I found it very strong and encrypted software. Easy to select and protect files or type your confidential conversation test later share your protected files or confidential conversation with authorizes parties. There is also a tracking system available to monitor data it help in tracking of any data leakage. Key system is very much strong and it is 2 step verification based. Q.5 Identify, what are the possible cryptographic algorithmsusedinTaming Sari. State its functionality too Standard symmetric encryption algorithms include RC4, AES, DES, 3DES, and QUAD. Standard asymmetric encryption algorithms include RSA, Diffie-Hellman, ECC, El Gamal, and DSA. Both data in transit and data at rest can be kept confidential and secure using cryptography. It can also guard against repudiation by authenticating senders and recipients. Many endpoints, often multiple clients, and one or more back-end servers are common in software systems. Q.6 The software implements 2 Factor Authentication. Describe what factor it implements, and does it improve the security of Taming Sari? Explain your answer. Two-factor authentication (2FA) is a security solution that requires two different forms of identity to gain access to something. A password is the first factor, and the second is usually a text message with a code sent to your smartphone, or biometrics utilizing your fingerprint, face, or retina. Q.7Statewhetherdoyou likeusingTaming SariEncryptionSoftware,andreasons to your answer.
  • 4. Yes, I like using Taming Sari encryption software the reason is its too much secure and its key system is tremendously impressive. It gives Protection of valuable information Security for user. It controls access, protects data, protects the system from viruses and network/Internet breaches, and protects against other system-level security threats. Q.8 Basedon your knowledgethat youhave gainedfrom Cryptographyand other security classes;howdo you want to improve Taming Sari Encryption Software? Confidentiality − Encryption technique can guard the information and communication from unauthorized revelation and access of information. Authentication − The cryptographic techniques such as MAC and digital signatures can protect information against spoofing and forgeries. Hashing algorithms and message digests are used in cryptography to maintain data integrity. The receiver is ensured that the data received has not been tampered with during transmission by giving codes and digital keys to confirm that what is received is legitimate and from the intended sender. So that is why I think Taming Sari is best in its own encryption software competition it.