Select Currency
Translate this page

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM.

Format: MS WORD  |  Chapter: 1-5  |  Pages: 57  |  1437 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM.

 

ABSTRACT

Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance. Due to unauthorized access to data in database, repose disclosure or modification will invade individual process, computers have been produced with an encipher and decipher package in various computer language like C++, paschal, Fortran, visual basic etc. voting modified from or RSA cipher encryption, the package is two keys are required. The two keys are public key and secret key respectively. The project is aimed at developing a computer data security system using data, encryption know as cryptography to LEECOM FINANCE AND INVESTMENT LTD. it also takes a look at the present data security of LEECOM FINANCE AND INVESTMENT LTD, identifying the problems encountered in carrying out these process.   

 

CHAPTER ONE

INTRODUCTION

1.1    BACKGROUND TO THE STUDY

When writing is new in a society, there will not be any data security, since the script itself is a cryptogram intelligible only to the few whom can read or write. But as literacy spread, cryptology appears soon after. This is true for the society in which we fine ourselves today. According to Demmy (1989) data security simply means the act of protecting something against attack, security is done as a result of safety. This is done to avoid the misuse of information relating to people of corporate bodies, whereby we protect our computer and data against unauthorized disclosure, modification and also security the system against virus and damage that might be caused by external force. During the ancient times, record keeping was done by means of primitive notches cut into wooden stick, on bone fragments or marks pressed in clay tables. They soon improved with the development of papyrus and calamus pen.

The ancient record keeping was well in hand and reached its peak in Roman Republic and Roman Empire. The census of 1890 turned out to be especially significant in the evolution of recorded machine processible form, for this census. Harman Hollevith has developed the punched card as a unit record and invented machinery for processing these records some 60years later, the first electronic computer was constructed and their application in record keeping system ushered in the era of computerization. From this humble beginning of antiquity, record keeping has grow into gigantic dimensions wit the advent of computer network, conferencing through computers and so on. These have increased the vulnerability of data both in stored form during communication to wire tapping; saving and accessibility. Another reason is that complexity of interaction of individual with their governments. With these new dimension dangers surfaced private and confidential records could easily become public property. This endangering with lives of people concern.

A solution had to be found to his problem of insecurity of data. A common technique for providing data security to sensitive information is encryption. Encryption entails the application of certain reversible transformation; to the message to be transmitted to render them unintelligent to all but those receivers who are in possession of the correct “key” used to encryption. The original message is decrypted by applying the reverse transformation specified by the key to the received encrypted message. Suppose two people A and B wish to communicate or exchange message on an issue they do not want to make public on what they want to keep between them. A number of questions or problems arise. These are: -

i. How can they make sure that no other person receives this message?

ii.  How can A (B) make sure that B (A) receive all of A’s call of B’s message?

iii. How can they make sure that they receive only these message and no other?

It can be seen that these present some real problem. As an illustration let us consider a business deal between two businessmen, A and B, geographically residing in two different areas and who communication with each other in some way, example by E-mail, mail, telephone, telex etc. another businessman Y, business vital Y, wishing to know what the deal is all about, may be able to tap into the communication line thus leading to problem.

As state above

i.  May rise in a situation whereby the vital Y, may decided to intercept the message from A to B, say, causing a delay in the cause of the business deal. This message might be easily detected if the recipient of the message does not get it at the said time, unlike problem.

ii. Whereby the message interception may be distorted or some message not there before may be added to it before being sent to the recipient. In a situation like this it is quite difficult to detect.

However, detection of an abnormal situation does not imply that it can be determined who caused it. Thus to ensure orderly communication of confidential message it is necessary that the authenticity of message be proved conclusively at some later point in time to any other party. Having established the fact that there is a multitude of problems with the notion of communication on despite its deception simplicity, and by extensions having decided that it is desirable to resolve this problem, we now direct our attention to possible solution.

ORGANIZATION OF WORK

This project contains seven chapter and they are as follows: - Chapter One: - It contain the introductions of the project, stating the problem the reason why the project is being written, the aim and objectives need of observation of the project, the limitation of the project, the assumption and the definition of terms of the project. Chapter Two: - Is all about the literature review of the project. Chapter Three: - Highlight the description and analysis of the existing system, the objectives of the existing system, problem encountered in the system were also highlighted, the limitations are also stated. Chapter Four: - Entails the development of the design of the new system, the input/output specification and design, the file design, the system requirement. Chapter Five: - Consists of implantation of the program design, the program flowchart, pseudo code, the source program and the test of run and also explained. Chapter Six: - Talks about the system, documentation program documentation and use documentation. Chapter Seven: -  Finally, talks about the conclusion and recommendation of the project. 

PURPOSE OF STUDY

This project work is carried out to make sure for maximum computerized data security system. It also prove the usefulness of computer in the case study. It will also enlighten the student in the course of studying relating to other fields of life. This project will also provided detailed information on the concept of data security. The importance of computerize and the importance of data security in the field. There is always the need in lives of individuals and corporation for privacy and secrecy. The purpose of study of this project of computer data and information.

IMPORTANCE OF STUDY

The study work ensures that data (information) will be secured against unwanted bodies; by developing a better data security system for the company (LEECON FINANCE AND INVESTMENT LIMITED). This study will also enable us to investigate a secured cryptosystem.

SCOPE

Security is required in any environment where information or items are not intended to be freely available to all. Depending on the medium through which this information is being passed across, different security measures are taken. The physical security of the hardwares can be protected by conventional methods such as a secure room and cardkeys, but the study of this is beyond the scope of this work. However, within this work, will be looking at one of the measure taken in security information when it is being transmitting from the transmitter to the receiver. In this case the problem is to write the message in such a way that an enemy or eavesdropper on the communication medium (which could be a paper, information-theoretic channel or a physical file on the computer system) cannot deduce or understand the content is of the message. 

  DOWNLOAD THE COMPLETE PROJECT

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM.

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM. INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Abdul Mateen Iddrisu
UDS
At first I taught is a site full of fraudsters until I saw my project in my Gmail after my payment.. THANK YOU IPROJECTMASTER and May God the almighty bless u guys abundantly
Excellent
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
MATTHEW NGBEDE
Ahmadu Bello University
I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!
Excellent
Oluchi From Michael Opara University
If you are a student and you have not used iprojectmaster materials, you are missing big time! iprojectmaster is the BEST
Excellent
Samuel From Ajayi Crowther University
You guys just made life easier for students. Thanks alot iprojectmaster.com
Excellent
Uduak From Uniuyo
IProjectMaster is the best project site for students. Their works are unique and free of plagiarism!
Excellent
Stancy M
Abia State University, Uturu
I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much iprojectmaster, infact, I owe my graduating well today to you guys...
Excellent
Ibrahim Muhammad Muhammad
Usmanu danfodiyo university, sokoto
It's a site that give researcher student's to gain access work,easier,affordable and understandable. I appreciate the iproject master teams for making my project work fast and available .I will surely,recommend this site to my friends.thanks a lot..!
Excellent

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM.?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM.?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM., What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!