NORMA eResearch @NCI Library

Encrypto: Technical Report

Kawala, James (2023) Encrypto: Technical Report. Undergraduate thesis, Dublin, National College of Ireland.

[thumbnail of Bachelor of Science]
PDF (Bachelor of Science)
Download (2MB) | Preview


In this modern era companies and individuals are becoming more aware about device security and are heavily investing more resources to create or utilise cybersecurity applications that contain a number of useful forensic tools. These tools can include file analysis, network analysis, encryption services and registry editor. Being able to track sensitive data, checking data integrity and encrypting sensitive file is an effective way to check, manage and secure any computer system.

My general interest in cybersecurity pushed me in creating an application that provide a user with comprehensive security and knowledge for their devices. I decided on focusing on creating a windows application that focuses on giving users a better understanding and security to their system by providing a range of powerful tools for analysing and protecting against potential threats. This application is called Encrypto, and it will provide the user with a host of modern-day forensic tools.

In this report, I will summarise my project, the background behind the idea of my project, the technologies I used, the system requirements and the applications overall functionalities. I will also highlight the system architecture, execution, GUI, testing of the application and if there is any further development needed for the project.

At the end of this report the user will have a better understanding of how to utilise Encrypto and how to better secure and encrypt their data to avoid security attacks or any risks. Customers using Encrypto will be able to make use of its fully fleshed components which allows them to quickly extract sensitive information pertinent to their organisation or individual needs. They will be able to narrow down the vast quantity of information such as file properties, network, and hash information. Additionally, users will have a better understanding of what security measures they need to implement on their devices to better secure themselves from potential threats.

Item Type: Thesis (Undergraduate)
Maycock, Keith
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
Q Science > QA Mathematics > Computer software
T Technology > T Technology (General) > Information Technology > Computer software
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Bachelor of Science (Honours) in Computing
Depositing User: Tamara Malone
Date Deposited: 23 Aug 2023 17:07
Last Modified: 23 Aug 2023 17:07

Actions (login required)

View Item View Item