Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/147959
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTan, Kevin Wei Loongen_US
dc.date.accessioned2021-04-20T08:05:32Z-
dc.date.available2021-04-20T08:05:32Z-
dc.date.issued2021-
dc.identifier.citationTan, K. W. L. (2021). A study of some vulnerabilities in information security. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/147959en_US
dc.identifier.urihttps://hdl.handle.net/10356/147959-
dc.description.abstractInformation security has always played a significant role in ensuring the privacy of our data is securely protected. It is built around 3 primary objectives, commonly known as CIA – Confidentiality, Integrity and Availability using various processes and tools. However, its application does not mean that there is no vulnerability to compromise the system. This may be due to poor implementation of the code written in the program, or an intentional motive made by a hacker with the goal of stealing data and information whenever it is available. This project aims to explore different types of methods to hide weak implementations in a legitimate program. These methods include the use of strong crypto algorithms. If there is any part in the cryptosystem that is weakly implemented (either ignorantly or deliberately), encrypted data using strong algorithms can still be retrieved easily without the user’s knowledge. Another method being explored, are hiding vulnerabilities in a program to allow attackers to easily take advantage of a remote command execution and having the ability to evade firewalls and avoiding antivirus programs. Thus, simulating a malicious program and the possibilities of what a hacker can do on a compromised machine. In this project, I have created a software product called, “The Knotty Chat” to test out these methods and include some recommendations based on my findings.en_US
dc.language.isoenen_US
dc.publisherNanyang Technological Universityen_US
dc.relationSCSE20-0163en_US
dc.subjectEngineering::Computer science and engineering::Data::Data encryptionen_US
dc.titleA study of some vulnerabilities in information securityen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorTay Kian Boonen_US
dc.contributor.schoolSchool of Computer Science and Engineeringen_US
dc.description.degreeBachelor of Engineering (Computer Engineering)en_US
dc.contributor.supervisoremailkianboon.tay@ntu.edu.sgen_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
SCSE20-0163_Kevin_Tan_Final_Report.pdf
  Restricted Access
A Study of Some Vulnerabilities in Information Security1.84 MBAdobe PDFView/Open

Page view(s)

95
Updated on Jun 27, 2022

Download(s)

15
Updated on Jun 27, 2022

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.