University : University of California UniLearnO is not sponsored or endorsed by this college or university.
Country : Australia
Assignment Task:

Task:

Abstract
Nowadays, many Internet users prefer to use web browsers with a privacy mode to hide their online activities. The aim of this project is to examine and mitigate privacy leaks in the privacy mode of web browsers. I will use forensic tools to find the traces of users’ browsing activities in the privacy mode from the web browser’s cache, cookies, databases, image gallery, web activity timeline, Internet history, download history, and URL files. I will also examine how third-party browser extensions work in the privacy mode. Last, I will come up with some countermeasures to prevent both local and remote attackers from exploiting such privacy leaks.

Introduction
Web browsers keep track of user activities by recording visited URLs, cookies, search words, etc. Other traces about user activities can be found on cache, memory, browser’s built-in databases, and network packets. In 2005, a web browser known as Apple Safari introduced the “private browsing” feature that claims to disable the tracking. The feature is now included in almost every popular web browser with a slightly different name. My research is to examine whether the private mode of these web browsers actually protect user privacy as advertised by using different forensic tools. I will also investigate if third-party browser extensions are compatible with the private mode. If a web browser or a third-party browser extension introduces privacy leaks, I will try to find countermeasures to prevent both local and remote attackers from exploiting such leaks.

Background
Said et al. investigated how Firefox uses SQLite databases and found that records can be retrieved after a user deleted them, as SQLite uses unallocated storage space to facilitate transactions [1]. Satvatet al. used a forensic tool, Winhex, to examine the artifacts left on a device by portable and private browsers [2]. They also came up with some countermeasures to prevent privacy leaks of user information in the incognito mode. They discussed how adding bookmarks could create potential leakage of user data and the steps that a browser vendor should take to create awareness to users about such security issues. Xu et al. examined the threat model that emphasizes on the security issues of a browser where a local attacker has physical access to a user’s machine and a remote attacker is being able to trace a user’s activity in a web browsing session [3]. They also proposed a security model to prevent web browsers and browser extensions from leaving traces of user activities on disk.

Methodology
In this project, I will use some forensic tools to retrieve user data from private browsing sessions. The list of forensic tools includes NetAnalysis, Browser History Examiner, Browser History Capture, Encase, and SQLite Examiner. NetAnalysis will be used to examine web browser history, cache, cookies, and recover deleted web browser artifacts and other components. Browser History Examiner will be used to capture and analyze the web activity timeline, search history, email addresses, cached web pages, and URL links. Browser History Capturer will be used to capture and analyze the history files from the browsers. Encase will be used for extracting the cached image gallery that a user has viewed in the privacy mode. SQLite examiner will inspect the contents of SQLite databases to capture images stored in the database and to examine the Binary Large Objects (BLOBs) using the built-in hex viewer. I will also the same collection of tools to examine and analyze several browser extensions and add-ons in the privacy mode to see if there are any privacy leaks.

 

IMPLEMENTING A COLLEGE ENQUIRY CHATBOT by

Ujaliben Kalpesh Bavishi

This project is focusing on creating a chatbot to be used by students to get their queries responded easily from the college website. The College Enquiry Chatbot has the capacity to make friendly  conversations; respond the course and faculty details; give the link for the academic calendar; answer the frequently asked questions; calculate the fees based on the student's input; and give the timings, address, contacts, and events information of the departments like Union, Library, IPGE, and AIRC. To build the chatbot, Microsoft Azure bot service as well as Microsoft cognitive services, namely, Text Analytics, LUIS, and QnA Maker are used.

 

The first part of the assignment is to perform the forensic analysis of browser extensions of chrome, firefox, safari, brave and microsoft edge in both normal and private mode using the forensic tools that include FTK Imager, Winhex and browser history examiner and browser history capture. Provide screenshots as evidence. Use the wireshark tool to analyze the network traffic while using the different web browsers as mentioned above in normal and private mode to collect artifacts left behind a browsing session and provide screenshots for it. I have attached a report file named project.docx where the above assignment needs to be included in that report.

The second part of the assignment is to change the format of the report file named project.docx . I have attached the project template format file. Please edit the report using this template. I have also attached a sample report file named sample.pdf where it shows how it should be written. Please consider the format of the report and deliver me the report in that format along with the abstract for this project. I have attached the project proposal that has the abstract for this project.

 

This IT  Assignment has been solved by our IT Experts at onlineassignmentbank. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : admin
  • Posted on : February 04th, 2019
  • Downloads : 4

Whatsapp Tap to ChatGet instant assistance