Select Currency
Translate this page

DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM

Format: MS WORD  |  Chapter: 1-5  |  Pages: 70  |  934 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE FULL PROJECT

CHAPTER ONE

1.0 INTRODUCTION

In today’s trend of information and security treat the main tool use in businesses to protect their internal network is the firewall. A firewall is a hardware and software system that allows only external users with specific characteristics to access a protected network. While firewalls are indispensable protection for the network at keeping people out, today’s focus on e-business applications is more about letting the right people inside your network. Network security can be defined as protection of networks and their services from unauthorized modification, destruction, or discovery, and provision of guarantee that the network performs in critical situations and have no harmful effects for neither user nor for employee. The International Telecommunication Union ITU, the International Information Processing IFIP, World background Organization WCO is all running to develop standards related to electronic commerce. DES was the result of a research project set up by International Business Machines (IBM) corporation in the late 1960’s which resulted in a cipher known as LUCIFER. In the early 1970’s it was determined to commercialise LUCIFER and a number of important changes were introduced. 

The encryption technology for network security, implementing information encryption and transmission on the network by using DES algorithm. Information security strategies deal with two issues: protecting the integrity of the business network and its internal systems. The field of information Technology (IT) Security as information technologies is represent merely component of information systems. A setting of a security can be defined as an organized framework consisting of concepts, beliefs, principles, policies, procedures, techniques, and measures that are required in order to protect the individual system property as well as the system as a whole against any intentional or unplanned threat.

1.1  BACKGROUND OF STUDY

Information system occupies a vital and unique position in any organization by virtue of the data and information, which it contains. Security of information is of great importance to any given organization this makes the information reliable since information stored can be referenced whenever necessary access by unauthorized persons.

This project analysis the activities and importance of securing information in any organizations and to see that the information is accurately maintained to help the management in decision making and control of the diverse activities of the organization. The Shell petroleum company are one of the Nigerian petroleum supplying company as a result keeps record of vital information given to them by any client so as to enable them make supply and sells. Therefore, for effective administration and management, the provision of network based security information system for every source of data is certainly inevitable, since it will take care of all the problems and inadequacies of the manual system.

Security plays very important role on information. Most security initiatives are defensive strategies — aimed at protecting the network base and collection of information and data, including the exchange of data (such as electronic data interchange, e-mail), access to data (shared databases, electronic bulletin boards), and automatic data capture (bar codes), etc. In information and network data security system the situation there are five interrelated and interacting components (people, software, hardware, procedures and data), one comes to the conclusion that security systems are (and should be looked upon as) information systems, comprising a technological communications and an organizational framework, rather than pure technological infrastructure. Security harms of TCP/IP TCP/IP, which is the main protocol used by Internet, has good behavior of interconnection, the independent technology of net, it support to many other protocols of application, and so on. Result based on the risk analysis, security policy is created. It consists of two parts: 

1) General security policy: The description of its processes and Organization, security policy Objectives, security infrastructure, identification of Assets, confidential data and general threats, Description of present status and description of Security measures, contingency plans. 

2) System security policy: It defines implementation of security policy in a specific system of a company. 

With security mechanisms based on security policy being in place, it is important to monitor their actual functionality. Internet security method 

1) Physical Internet security 

2) Encryption techniques: The information on the net, which is transporting or storing, could be encrypted in order to prevent the steeling behaviors from the third party. Encryption is the most common method of ensuring confidentiality. 

3) Virtual private network (VPN) technology: VPN technology using variable public network as a transmission medium of information, through the additional security tunnels, user authentication and access control technology similar to a private network security. 

4) Data encryption technology: The so-called data encryption is to re-encode the information in order to hide the information content, so that unauthorized users cannot obtain the information content, it is an important security way in e-commerce. 

5) Firewall techniques: Firewall technology is a secure access control technology. 

The basic types mainly are application gate, circuit-level gate firewall based on the packet filtering, and firewall based on the all-state checking. Firewall technology used in an insecure public network security environment to accomplish local network security. Firewalls should a small part of the business security infrastructure

6) Strengthen the preventing and treatment of viruses: Viruses are the most showing threat to client systems. Setting the client-level protecting, web access, e-mail serve level protection, and file application serve level protection. 

Setting all the system files and executive file read-only is useful to protect important files. Restraining using floppy disk with uncertain resource, as well as the piratical software, is significant for cutting the spread path of the viruses. The e-mails should be kept unread, the same to the accessories. The multiple privilege access schemes present in Unix, VMS and other multi-user operating systems prevents a ―virus from damaging the entire system. It will only damage a specific user’s files. A part of concern should also be put into the insecurity the system itself, which needs updating from the realty-explorer regularly. If the system had be found to be contagious unluckily during the checking, corresponding methods should be carried out to clear the viruses away from the net.

1.2  STATEMENT OF THE PROBLEM

In spite of the level of computation of various organizations, this particular organization on discussion is still at the grass root level. It requires a certain degree of protection especially of vital equipment’s, properties and information and this cannot be realized through the current system of operation, which is the manual system.

1.3   PURPOSE OF THE STUDY

The purpose of this study is to provide a network based, security information system and interactive package that will accurately and efficiently record all data and information about business operation and management.

It will also eradicate the numerous problems associated with the manual technique of securing information in order to facilitate the transfer and retrieval of information between the various departments of the organization,

1.4   AIMS AND OBJECTIVES

Having studied the activities of the police station some benefits could be derived from the computerization of information system and this includes:

1.  Higher security efficiency of information 

2.  Quicker access to individual data

3.  Faster treatment of information security oriented cases.

4.  Provision of output information in a readily comprehensible form to those persons involved in the activities of the organization. Provision of communication channels. To compass formal and informal component.

5.  To provide storage facilities for data not immediately required or that may be required to be used more than once.

1.5   THE SCOPE OF THE STUDY

This study will cover shell Petroleum Company and its operation and activities carried out in terms of information sharing and data.  Also the scope is centered on eradicate the numerous problems associated with the manual technique of securing information in order to facilitate the retrieval of information.

1.6   LIMITATIONS

A lot of militating constraints were encountered during the course of this write up. They are:

Inaccessibility to some documents, which arose due to security, imposed on some of the organization documents by the management. It was not also possible to make an in-dept study of these documents, which would have helped in the development of the project work.

Time was a major limitation to this write up, there wasn’t enough time to study the details of the various field of the information department of the organization unavailability of textbook needed for this write – up was not found in the institution library.

1.7  ASSUMPTIONS

For easy implementation of this study some assumption were made. It is assumed that the software to be designed for the study will help shell petroleum in an effective service delivery. Finally, it is also assumed that by computerizing this organization, information security has been implemented to handle their day to day cases in a better and more organized manner.

  DOWNLOAD THE FULL PROJECT

DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Abraham Ogbanje
NATIONAL OPEN UNIVERSITY OF NIGERIA
At first I was afraid.. But I discovered they are legit. I will bring more patronize
Very Good
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
Abdulrahman Jibrin
Nti Abaji
Nice one work prompt delivery tanx
Very Good
Oluchi From Michael Opara University
If you are a student and you have not used iprojectmaster materials, you are missing big time! iprojectmaster is the BEST
Excellent
Merry From BSU
I am now a graduate because of iprojectmaster.com, God Bless you guys for me.
Excellent
Joseph M. Yohanna
Thanks a lot, am really grateful and will surely tell my friends about your website.
Excellent
Adam Alhassan Yakubu
UDS
Excellent work and delivery , I promise to share my testimonies everyone in need of this kind of work. You're the best
Excellent
MATTHEW NGBEDE
Ahmadu Bello University
I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!
Excellent
Emmanuel Essential
Kogi state University
I actually took the risk,you know first time stuff But i was suprised i received as requested. I love you guys 🌟 🌟 🌟 🌟
Very Good

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!