Investigating the effectiveness of privacy tools versus forensic tools

In the current information age, where people are increasingly connected through the Internet, privacy has become a huge concern. Disclosure of personal information through the Internet has posed a large threat to users. Although there are a variety of privacy tools out in the market, the privacy of...

Full description

Saved in:
Bibliographic Details
Main Author: Ng, Yong Bin.
Other Authors: Woo Wing Keong
Format: Final Year Project
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/52561
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-52561
record_format dspace
spelling sg-ntu-dr.10356-525612023-03-03T20:29:29Z Investigating the effectiveness of privacy tools versus forensic tools Ng, Yong Bin. Woo Wing Keong School of Computer Engineering DRNTU::Engineering In the current information age, where people are increasingly connected through the Internet, privacy has become a huge concern. Disclosure of personal information through the Internet has posed a large threat to users. Although there are a variety of privacy tools out in the market, the privacy of users could still be compromised. As a result, this project has conducted an investigation on the effectiveness of the open- source privacy tools, which protects the privacy of users while using Internet Explorer (IE) to surf the Internet. In this project, preliminary investigations were performed on the 4 open-source privacy tools against 3 open-source forensic tools to study the various approaches of wiping process. From this preliminary investigation, there were 3 important factors that would determine the success of recovering a file from a forensic tool: the filename, the index pointer and the content in the disk sector. From the recovered results, the filename was the most common information that a forensic tool could recover. Furthermore, with the understanding of those approaches, it was used to evaluate the implementation of the 3 IE privacy tools (open-source) that protects the privacy of the user as they used IE browser. In addition, it also provided an insight on how vulnerable these tools could be when wiping the various types of digital trail. A further investigation was also conducted to examine the untouched digital trail, which was recorded by the Windows system as the user was using the privacy tool. As a result, a prototype implementation “blockProgram.vbs” was suggested and it successfully prevented the system from recording this trail. However, due to the ever-changing technology, there is no perfect privacy tool that is able to fully protect the user’s privacy. As such, further studies are needed to explore on the privacy tools as technology continues to advance. Bachelor of Engineering (Computer Engineering) 2013-05-17T03:43:58Z 2013-05-17T03:43:58Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/52561 en Nanyang Technological University 84 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Ng, Yong Bin.
Investigating the effectiveness of privacy tools versus forensic tools
description In the current information age, where people are increasingly connected through the Internet, privacy has become a huge concern. Disclosure of personal information through the Internet has posed a large threat to users. Although there are a variety of privacy tools out in the market, the privacy of users could still be compromised. As a result, this project has conducted an investigation on the effectiveness of the open- source privacy tools, which protects the privacy of users while using Internet Explorer (IE) to surf the Internet. In this project, preliminary investigations were performed on the 4 open-source privacy tools against 3 open-source forensic tools to study the various approaches of wiping process. From this preliminary investigation, there were 3 important factors that would determine the success of recovering a file from a forensic tool: the filename, the index pointer and the content in the disk sector. From the recovered results, the filename was the most common information that a forensic tool could recover. Furthermore, with the understanding of those approaches, it was used to evaluate the implementation of the 3 IE privacy tools (open-source) that protects the privacy of the user as they used IE browser. In addition, it also provided an insight on how vulnerable these tools could be when wiping the various types of digital trail. A further investigation was also conducted to examine the untouched digital trail, which was recorded by the Windows system as the user was using the privacy tool. As a result, a prototype implementation “blockProgram.vbs” was suggested and it successfully prevented the system from recording this trail. However, due to the ever-changing technology, there is no perfect privacy tool that is able to fully protect the user’s privacy. As such, further studies are needed to explore on the privacy tools as technology continues to advance.
author2 Woo Wing Keong
author_facet Woo Wing Keong
Ng, Yong Bin.
format Final Year Project
author Ng, Yong Bin.
author_sort Ng, Yong Bin.
title Investigating the effectiveness of privacy tools versus forensic tools
title_short Investigating the effectiveness of privacy tools versus forensic tools
title_full Investigating the effectiveness of privacy tools versus forensic tools
title_fullStr Investigating the effectiveness of privacy tools versus forensic tools
title_full_unstemmed Investigating the effectiveness of privacy tools versus forensic tools
title_sort investigating the effectiveness of privacy tools versus forensic tools
publishDate 2013
url http://hdl.handle.net/10356/52561
_version_ 1759857722339098624