Investigating the effectiveness of privacy tools versus forensic tools
In the current information age, where people are increasingly connected through the Internet, privacy has become a huge concern. Disclosure of personal information through the Internet has posed a large threat to users. Although there are a variety of privacy tools out in the market, the privacy of...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/52561 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-52561 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-525612023-03-03T20:29:29Z Investigating the effectiveness of privacy tools versus forensic tools Ng, Yong Bin. Woo Wing Keong School of Computer Engineering DRNTU::Engineering In the current information age, where people are increasingly connected through the Internet, privacy has become a huge concern. Disclosure of personal information through the Internet has posed a large threat to users. Although there are a variety of privacy tools out in the market, the privacy of users could still be compromised. As a result, this project has conducted an investigation on the effectiveness of the open- source privacy tools, which protects the privacy of users while using Internet Explorer (IE) to surf the Internet. In this project, preliminary investigations were performed on the 4 open-source privacy tools against 3 open-source forensic tools to study the various approaches of wiping process. From this preliminary investigation, there were 3 important factors that would determine the success of recovering a file from a forensic tool: the filename, the index pointer and the content in the disk sector. From the recovered results, the filename was the most common information that a forensic tool could recover. Furthermore, with the understanding of those approaches, it was used to evaluate the implementation of the 3 IE privacy tools (open-source) that protects the privacy of the user as they used IE browser. In addition, it also provided an insight on how vulnerable these tools could be when wiping the various types of digital trail. A further investigation was also conducted to examine the untouched digital trail, which was recorded by the Windows system as the user was using the privacy tool. As a result, a prototype implementation “blockProgram.vbs” was suggested and it successfully prevented the system from recording this trail. However, due to the ever-changing technology, there is no perfect privacy tool that is able to fully protect the user’s privacy. As such, further studies are needed to explore on the privacy tools as technology continues to advance. Bachelor of Engineering (Computer Engineering) 2013-05-17T03:43:58Z 2013-05-17T03:43:58Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/52561 en Nanyang Technological University 84 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering |
spellingShingle |
DRNTU::Engineering Ng, Yong Bin. Investigating the effectiveness of privacy tools versus forensic tools |
description |
In the current information age, where people are increasingly connected through the Internet, privacy has become a huge concern. Disclosure of personal information through the Internet has posed a large threat to users. Although there are a variety of privacy tools out in the market, the privacy of users could still be compromised. As a result, this project has conducted an investigation on the effectiveness of the open- source privacy tools, which protects the privacy of users while using Internet Explorer (IE) to surf the Internet.
In this project, preliminary investigations were performed on the 4 open-source privacy tools against 3 open-source forensic tools to study the various approaches of wiping process. From this preliminary investigation, there were 3 important factors that would determine the success of recovering a file from a forensic tool: the filename, the index pointer and the content in the disk sector. From the recovered results, the filename was the most common information that a forensic tool could recover. Furthermore, with the understanding of those approaches, it was used to evaluate the implementation of the 3 IE privacy tools (open-source) that protects the privacy of the user as they used IE browser. In addition, it also provided an insight on how vulnerable these tools could be when wiping the various types of digital trail.
A further investigation was also conducted to examine the untouched digital trail, which was recorded by the Windows system as the user was using the privacy tool. As a result, a prototype implementation “blockProgram.vbs” was suggested and it successfully prevented the system from recording this trail.
However, due to the ever-changing technology, there is no perfect privacy tool that is able to fully protect the user’s privacy. As such, further studies are needed to explore on the privacy tools as technology continues to advance. |
author2 |
Woo Wing Keong |
author_facet |
Woo Wing Keong Ng, Yong Bin. |
format |
Final Year Project |
author |
Ng, Yong Bin. |
author_sort |
Ng, Yong Bin. |
title |
Investigating the effectiveness of privacy tools versus forensic tools |
title_short |
Investigating the effectiveness of privacy tools versus forensic tools |
title_full |
Investigating the effectiveness of privacy tools versus forensic tools |
title_fullStr |
Investigating the effectiveness of privacy tools versus forensic tools |
title_full_unstemmed |
Investigating the effectiveness of privacy tools versus forensic tools |
title_sort |
investigating the effectiveness of privacy tools versus forensic tools |
publishDate |
2013 |
url |
http://hdl.handle.net/10356/52561 |
_version_ |
1759857722339098624 |