NORMA eResearch @NCI Library

Cyber-Vault: Final Report

Kumar, Shaurya (2022) Cyber-Vault: Final Report. Undergraduate thesis, Dublin, National College of Ireland.

[thumbnail of Bachelor of Science]
PDF (Bachelor of Science)
Download (11MB) | Preview


This Mid-point report is a requirement for the final year Software project which is to mainly display our progress and the future plan according to it. One of its goals is also to help us analyse the difficult points of our application; what difficult points have been achieved and how to tackle any other challenging matter ahead. The main purpose of this report is to emphasize on my progress till date, current designs and implementation, deviation from original plans and changes included as well as alternate implementations/solutions utilised, results of current progress etc.

The key points of the report include the current progress which include the implementation of the basic React application implementing Facial recognition login/registration using openCV’s face_recognition as a part and in combination with the dlib library which contains the implementation of deep metric learning used to convert face image sin 128 bit vectors used for comparison and authentication, this is all done in the backend flask server details of which are explained in the project analysis sections. Another major implementation as a part of the current progress includes the implementation of the Have I Been Pawned troy hunt cross-referencing library extension as a part being accessible after a successful login. Which implements a react component implementing the Have I been Pawned API thus helping recognize the if a password has been breached or used before and how many times, thus declaring it safe or unsafe regarding its use. Further important parts of the report include how the implementation of previously planned features has been altered while being developed and why they were changed. The report also importantly includes the use cases for all potential functional requirements with their descriptions and wireframes for the final potential designs of the application also including the non-functional requirements which indicate what the prototype is achieving, satisfying and what its capable of as well as it’s though of architectural structure which is all explained below.

Item Type: Thesis (Undergraduate)
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
Q Science > QA Mathematics > Computer software
T Technology > T Technology (General) > Information Technology > Computer software
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Bachelor of Science (Honours) in Computing
Depositing User: Clara Chan
Date Deposited: 05 Sep 2022 09:41
Last Modified: 05 Sep 2022 09:41

Actions (login required)

View Item View Item