文档介绍:Cyber-Security Toolbox
Cyber-Security Toolbox
CYBER-SECURITY TOOLBOX
Compiled by: Michael Chesbro June 2011
Edition-3
The Cyber-Security Toolbox contains several security techniques and programs that can be employed by
the individual user to make his or her electronic information and munications more
secure.
The Cyber-Security Toolbox piled from multiple open sources, and system help files. This
document is pilation of data obtained from the links given herein, and is intended to aid users in
establishing a more secure ‘cyber-environment’.
Every bit of cyber-security we use makes it that much more difficult for hackers, spies, criminals and
other adversaries to access our electronic systems, steal our information, or disrupt our operations.
Michael Chesbro 1
Cyber-Security Toolbox
Table of Contents
Encrypt an e-mail message in Microsoft Office Outlook 2007
Digital Certificates
Use Safe Access File Exchange (SAFE) to Securely Exchange Large Files
Use Encryption Wizard (EW) to Secure Your Files
JavaScrypt: Browser-Based Cryptography
Pretty Good Privacy (PGP)
Hushmail
Ironkey
Create a puting Environment with Lightweight Portable Security
Puppy Linux
TrueCrypt - Free open-source disk encryption software
Install Anti-Virus Software on Your puter
Participate in IA Education, Training and Awareness Programs
Use Your DoD CAC At Home
Use the Password Function in Microsoft Office to Protect Your Documents
Use a Secure Erase Utility to Destroy Electronic Data
Use Strong Passwords
Store Your Passwords in a Password Safe
Protect Data-At-Rest (DAR) – Enable Microsoft Encrypting File System
United States Postal Service Electronic Postmark
Use AKO/DKO IM & Chat
Enable Secure Logon (CTRL+ALT+DELETE )
Cellular Telephones and PDAs
Zfone
Vumber - Virtual Phone Number
Google Voice
Whisper Systems (En