Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/59122
Title: Effectiveness of privacy tools versus forensic tools
Authors: Chen, Andros Peihan
Keywords: DRNTU::Engineering::Computer science and engineering::Data::Files
Issue Date: 2014
Abstract: Today, with the current technology advances we have, people are increasingly more connected to the Internet, whereby privacy of data has increasing become a concern among people. Such as credit card information theft or confidential data in the computer which cannot be disclosed to the “anybody”. Although there are many varieties of Privacy Tools online which can help attempt to remove these confidential data away from the hard disk, the privacy of the users could still be compromised in some ways. As a result, this project has conducted several experiments and investigation on the effectiveness of various Open-Source Privacy Tools found online, which protects the privacy of the users by wiping the disk sectors with random bits of data or bits of 0s and removing entries from the Master File Table which ensures that all these unwanted data cannot be recovered by any ‘attackers’ who wished to get a hold of the confidential data. In this project, various experiments and investigations were performed on the Window Utility provided by Windows and 3 Open-Source Privacy Tools against 5 Open-Source Forensic Tools to study and evaluate the effectiveness of various wiping algorithms approach used by the Privacy Tools. There are 2 important factors which determine the effectiveness of the Privacy Tools, the file name entries in the Master File Table, and the content in the disk sector, as it can be easily be recovered by the Forensic Tools if these traces of digital was not cleared. An implementation of Prototype Free Space Cleaner and Master File Table Reader have been integrated together to be used to protect the privacy of the users as well as discover the traces of digital trails left over in the disk sector. However, due to ever-advancement and changing technology, newer and better Forensic Tools will be created to attempt to recover these data which are considered as ‘deleted’ forever. Therefore new investigations and experiments on new Privacy Tools should be conducted as technology advances.
URI: http://hdl.handle.net/10356/59122
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
FINAL YEAR PROJECT REPORT.pdf
  Restricted Access
Privacy Tools Versus Forensic Tools5.22 MBAdobe PDFView/Open

Page view(s) 50

143
checked on Oct 29, 2020

Download(s) 50

8
checked on Oct 29, 2020

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.