Effectiveness of privacy tools versus forensic tools

Today, with the current technology advances we have, people are increasingly more connected to the Internet, whereby privacy of data has increasing become a concern among people. Such as credit card information theft or confidential data in the computer which cannot be disclosed to the “anybody”. Al...

Full description

Saved in:
Bibliographic Details
Main Author: Chen, Andros Peihan
Other Authors: School of Computer Engineering
Format: Final Year Project
Language:English
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/10356/59122
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-59122
record_format dspace
spelling sg-ntu-dr.10356-591222023-03-03T20:37:22Z Effectiveness of privacy tools versus forensic tools Chen, Andros Peihan School of Computer Engineering Tan Kheng Leong DRNTU::Engineering::Computer science and engineering::Data::Files Today, with the current technology advances we have, people are increasingly more connected to the Internet, whereby privacy of data has increasing become a concern among people. Such as credit card information theft or confidential data in the computer which cannot be disclosed to the “anybody”. Although there are many varieties of Privacy Tools online which can help attempt to remove these confidential data away from the hard disk, the privacy of the users could still be compromised in some ways. As a result, this project has conducted several experiments and investigation on the effectiveness of various Open-Source Privacy Tools found online, which protects the privacy of the users by wiping the disk sectors with random bits of data or bits of 0s and removing entries from the Master File Table which ensures that all these unwanted data cannot be recovered by any ‘attackers’ who wished to get a hold of the confidential data. In this project, various experiments and investigations were performed on the Window Utility provided by Windows and 3 Open-Source Privacy Tools against 5 Open-Source Forensic Tools to study and evaluate the effectiveness of various wiping algorithms approach used by the Privacy Tools. There are 2 important factors which determine the effectiveness of the Privacy Tools, the file name entries in the Master File Table, and the content in the disk sector, as it can be easily be recovered by the Forensic Tools if these traces of digital was not cleared. An implementation of Prototype Free Space Cleaner and Master File Table Reader have been integrated together to be used to protect the privacy of the users as well as discover the traces of digital trails left over in the disk sector. However, due to ever-advancement and changing technology, newer and better Forensic Tools will be created to attempt to recover these data which are considered as ‘deleted’ forever. Therefore new investigations and experiments on new Privacy Tools should be conducted as technology advances. Bachelor of Engineering (Computer Science) 2014-04-23T10:30:35Z 2014-04-23T10:30:35Z 2014 2014 Final Year Project (FYP) http://hdl.handle.net/10356/59122 en Nanyang Technological University 142 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Data::Files
spellingShingle DRNTU::Engineering::Computer science and engineering::Data::Files
Chen, Andros Peihan
Effectiveness of privacy tools versus forensic tools
description Today, with the current technology advances we have, people are increasingly more connected to the Internet, whereby privacy of data has increasing become a concern among people. Such as credit card information theft or confidential data in the computer which cannot be disclosed to the “anybody”. Although there are many varieties of Privacy Tools online which can help attempt to remove these confidential data away from the hard disk, the privacy of the users could still be compromised in some ways. As a result, this project has conducted several experiments and investigation on the effectiveness of various Open-Source Privacy Tools found online, which protects the privacy of the users by wiping the disk sectors with random bits of data or bits of 0s and removing entries from the Master File Table which ensures that all these unwanted data cannot be recovered by any ‘attackers’ who wished to get a hold of the confidential data. In this project, various experiments and investigations were performed on the Window Utility provided by Windows and 3 Open-Source Privacy Tools against 5 Open-Source Forensic Tools to study and evaluate the effectiveness of various wiping algorithms approach used by the Privacy Tools. There are 2 important factors which determine the effectiveness of the Privacy Tools, the file name entries in the Master File Table, and the content in the disk sector, as it can be easily be recovered by the Forensic Tools if these traces of digital was not cleared. An implementation of Prototype Free Space Cleaner and Master File Table Reader have been integrated together to be used to protect the privacy of the users as well as discover the traces of digital trails left over in the disk sector. However, due to ever-advancement and changing technology, newer and better Forensic Tools will be created to attempt to recover these data which are considered as ‘deleted’ forever. Therefore new investigations and experiments on new Privacy Tools should be conducted as technology advances.
author2 School of Computer Engineering
author_facet School of Computer Engineering
Chen, Andros Peihan
format Final Year Project
author Chen, Andros Peihan
author_sort Chen, Andros Peihan
title Effectiveness of privacy tools versus forensic tools
title_short Effectiveness of privacy tools versus forensic tools
title_full Effectiveness of privacy tools versus forensic tools
title_fullStr Effectiveness of privacy tools versus forensic tools
title_full_unstemmed Effectiveness of privacy tools versus forensic tools
title_sort effectiveness of privacy tools versus forensic tools
publishDate 2014
url http://hdl.handle.net/10356/59122
_version_ 1759855151670099968