Select Currency
Translate this page

DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS

Format: MS WORD  |  Chapter: 1-5  |  Pages: 52  |  798 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE FULL PROJECT

DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS

 
 
 

 

CHAPTER ONE

INTRODUCTION

1.O    BACKGROUND OF THE STUDY

The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is a valuable and costly asset that must be presented, controlled and planned just like other valuable assets within an organization. This work is designed to provide a security mechanism using a computerized data encryption system, readable data is altered into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concept to create coded message that is virtually impossible to break. It is easy to encrypt a message on a simple personal computer so that the biggest computer in the world could not decipher without spending for more time on the problem that exists in the life span of the entire universe.

There are two basic forms of encryption; private key encryption and public key encryption, the same secret key is used by the sender and receiver to encrypt and decrypt message. Public key encryption also known as asymmetric key encryption uses two different keys at once, a combination of a private key and public key, the private key is known only to your personal computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.

STATEMENT OF THE PROBLEM

Security is currently a widespread and growing concern that affects all areas of the society, in the same manner data and information security has become one of the most pressing challenges confronting all kinds of present day organizations owing to their rapid adoption of information technology (IT) in the entirety of their activities. This development has made data and information to a larger extend vulnerable to unauthorized users, spammers, crawlers and hackers who break into people’s and organization’s privacy. This has no doubt posed greater challenges on people who use database, share files and other resources on computer networks.

AIMS AND OBJECTIVES

The aims and objectives of this work are as follows:

Reduce stress, time consumption and cost of operation involved in a manual security system. Develop a software system that will restrict unauthorized access to data files on systems. Suggest security techniques which can create conducive working atmosphere for organizations that are having their data threatened. Enhance key sharing mechanism that allows users to share and have access to files security. SIGNIFICANCE OF THE STUDY

This study serves as a contribution towards improving information, data and information security on computerized information systems especially for organizations where data is transferred from one point to another. It will contribute in solving the problems of insecurity on both network for individual computers on a network. It also enhances the ability to support customers by providing secured and accurate access to all information. In the same manner, it will benefit those who transact online.

SCOPE AND LIMITATIONS

This work is only concerned with security of information (encryption and decryption) for firms and individuals. It does not consider the firms policies and other issues.

JUSTIFICATION OF THE NEW SYSTEM

With regards to existing system, it is important for organization to develop a new system. This system will be designed with security as its watchword. It will be able to check access to the system. It will provide improved system efficiency, the unintentional distortion of data will be avoided and fraudulent practices and defaulters will be checked.

DEFINITION OF TERMS Data: data is the raw fact or observation, typically about physical entity or business transactions. Technically, data is the raw form of information stored as columns and rows in our databases, network servers and personal computers. Data security: This is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data. Information: This refers to data that has been processed in such a way to be meaningful to the person who receives it. Cryptography: This is the science of scrambling data. Encryption: encryption is the conversion of data into a form that cannot be easily understood by an unauthorized people. Decryption: Decryption is the process of converting encrypted data back into its original form, so it can be understood. Cipher text: this is the encrypted data; it is also called a cipher. Decipher text: This is the decrypted data; it is also called a plain text.

  DOWNLOAD THE FULL PROJECT

DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Abdul Mateen Iddrisu
UDS
At first I taught is a site full of fraudsters until I saw my project in my Gmail after my payment.. THANK YOU IPROJECTMASTER and May God the almighty bless u guys abundantly
Excellent
Oluchi From Michael Opara University
If you are a student and you have not used iprojectmaster materials, you are missing big time! iprojectmaster is the BEST
Excellent
Samuel From Ajayi Crowther University
You guys just made life easier for students. Thanks alot iprojectmaster.com
Excellent
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Emmanuel Essential
Kogi state University
I actually took the risk,you know first time stuff But i was suprised i received as requested. I love you guys 🌟 🌟 🌟 🌟
Very Good
Stancy M
Abia State University, Uturu
I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much iprojectmaster, infact, I owe my graduating well today to you guys...
Excellent
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
Adam Alhassan Yakubu
UDS
Excellent work and delivery , I promise to share my testimonies everyone in need of this kind of work. You're the best
Excellent
Abubakar Iliyasu Hashim
Federal college of education pankshin affiliated to university of jos
I am highly impressed with your unquantifiable efforts for the leaners, more grace to your elbow.I will inform my colleagues about your website.
Very Good
Abraham Ogbanje
NATIONAL OPEN UNIVERSITY OF NIGERIA
At first I was afraid.. But I discovered they are legit. I will bring more patronize
Very Good

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!