Cybersecurity background
BITS 3423 - Information Technology Security

GROUP H - Security Tools Manual

In today's digital era, organizations rely on IT systems, and protecting data, maintaining availability, and securing remote access are critical. This manual provides a detailed guide on three essential security tools across different subtopics, demonstrating their installation, use, and impact on the CIA security model.

Security Tools Overview

Explore our comprehensive guide on three essential security tools that demonstrate the CIA security model in action.

Wondershare Recoverit

Data Recovery

A sophisticated data recovery system designed to retrieve lost, deleted, or formatted files from a wide range of storage devices with a 99.5% success rate.

Explore Recoverit

Cyberduck

FTP Application

A file transfer application supporting secure protocols like FTPS and SFTP, enabling encrypted file transfers to protect data confidentiality.

Explore Cyberduck

HelpWire

Remote Access

A professional remote access service providing secure, encrypted sessions with explicit user approval for IT support and system maintenance.

Explore HelpWire

The CIA Security Model

Understanding how each tool implements the three pillars of information security.

Confidentiality

Ensuring that sensitive information is accessed only by authorized individuals through encryption and access controls.

Integrity

Maintaining the accuracy and completeness of data, ensuring it hasn't been altered by unauthorized parties.

Availability

Guaranteeing that authorized users have reliable and timely access to information and resources when needed.

Meet Our Team

The dedicated members behind GROUP H's Security Tools Manual.

Harraz Hilmi

Harraz Hilmi

B032410540

Asnatul Husna

Asnatul Husna

B032320109

Najia Hana

Najia Hana

B032320080

Amirul Hafizi

Amirul Hafizi

B032320106

Intan Fatihah

Intan Fatihah

B032410887

Disclosure Forms

Each team member's disclosure letter for the project.