Select Currency
Translate this page

DESIGN AND DEVELOPMENT OF INTERNET SECURITY PACKAGE

Format: MS WORD  |  Chapter: 1-5  |  Pages: 58  |  1457 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

DESIGN AND DEVELOPMENT OF INTERNET SECURITY PACKAGE (A CASE STUDY OF ACCESS POINT COMMUNICATION LIMITED UMUAHIA)

 

ABSTRACT

This project study is focused on the design and development of security package for the Access Point Communication Limited. This research work came to existence the time when internet café business is becoming very popular and vast. The principal objective of this project is to stop or deny access to an unauthorized user and also to ensure proper accountability of cash received by the ticketers. Therefore the design and development of this internet security package for Access Point Limited is worth while. This project covers all the general procedure involved in the design and development of a reliable in-house software application package that will provide automated Customer services for a cyber café. These procedures include the initial. Design, coding, testing, implementation, maintenance and enhancement of the new system. Thus this software will provide an accurate timing and billing information at any point in time for a cyber café operation.

 

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

The Internet has been described as the most revoluntary communication development of last century. It has changed everything about every type of business and there seems no end in sight to the advantages this phenomenon can bring to this enhancement of business communications. The Internet is a system for providing communication links between computers via local companies referred to as Internet of computer networks that is changing the way organizations and individuals communicates and do business.

However, the major drawback is the security risks associated with it. The Internet suffers from a significant and widespread security problems. Perhaps, most important of all reason adduced for the poor security facilities on the internet may be the fact that was not designed to every secure: open access for the purpose of research was the prime motivation for the internet at the time of its conception. Other factors responsible for the security lapse of the internet which is based on the TCP/IP (Transmission Control Protocol/Internet Protocol) suite of protocol. A number of TCP/IP (Transmission Control Protocol/ Internet Protocol) suites of protocols. A number of TCP/IP services are not secured and compromised by knowledgeable hackers. A number of security problems can be remedied or reduced through the use of this software and control for host security.

1.2 STATEMENT OF PROBLEMS

Some of the problems with the internet security are as a result of inherent vulnerabilities in the services (and the protocols that the services implement), while others are as a result of host configuration and access controls that are poorly implemental or overly complex to administer. Additionally, the role and importance of system management is often short-changed in job description resulting in many administrators begin at best, part-time and poorly prepared. Further more, the unavailability of experts who will carry the job for the people. Also the cost at which people or individuals will undergo before acquiring one will also arise to be a problem.

1.3 OBJECTIVES OF THE PROJECT

The objective of this research work is to develop a client billing software program with modification of existing software and eliminating the entire obstacle in previous version of the numerous existing clients billing software program. Apart from producing an enhancement; It will also:

i. prepare daily account of all transaction with clients

ii. Produce analyzed report for decision making

iii. Provide security to enhance system lock when credit expires.

iv. Automatically generate numbers as ID’S and allocate time and payments by clients.

v. Enable the system within the network to identify user with particular name and password.

1.4 SIGNIFICANCE OF THE PROJECT

Like any other application development the significance of this project is to make internet café business much more profitable to the investors. An internet café without effective security will gradually die because of pester and cashier stall time spend by clients. This software is intended to stop the death of internet café’s with attendant un employment in the space. This will be facilitated by the development of automated technique i.e. café billing to check time automatically.

1.5 SCOPE OF STUDY

This project work or study is aimed at designing and developing a time billing software for the Access Point Communication Limited. Furthermore, it is also aimed at saving the management of the access point communication limited the trouble and difficulties in running an internet café manually.

1.6 LIMITATION

The main problem encountered or the constraints in the course of this research were with the initial difficulty in grasping the knowledge of the field, which was quite alien to the researcher. Though this was overcame within a short period of time. Also, the obtaining of accurate and complete information from the case study (Access Point Communication Limited) was somewhat inhibited. The researcher had to do some independent investigations and internet browsing to ensure that relevant information was used.

Finally, the issue of time can not be forgotten. This was a very limited time to carry out the research or the project and also limited time to produce the project work.

1.7 DEFINITION OF TERMS

INTERNET: this is an act linking several computers in the world in a wide area network.

E-MAIL: the term electronic mail is used to describe various system of sending data or message electronically via the telephone. Network or other data network, through a central computer without the need to post letters

SECURITY: this is an act of safeguarding a file or a document in order to allow unauthorized access. 

FLOWCHART: This is the diagrammatic representation of the program components using standard symbols.

HARDWARE: this is the physical part of a computer system.

SOFTWARE: This is the program that controls the computer operation.

DATABASE: A collection of interrelated data stored with controlled redundancy to serve one or more application. 

MICRO SOFT VISUAL BASIC: This is software which allows you to develop your own software 

WWW: - This stands for World Wide Web which consists of the different website which you can visit. 

NEWS GROUP: These are meeting please for people discussing special topic

NETWORK SERVERS: These are devices used to manage how the various resources on the network are shared.

HACKING: A hacker is people who attempt to invade the privacy of a system. Hackers are normally skilled programmers. 

METHODOLOGY: A methodology is a collection of procedure techniques, tools and documentation aids which will help the system developer in their effort to implement a new information system.

ONLINE: This is the direct connection to the computers through the internet and under the influence of the computer C.P.U 

OFFLINE: This is the process of the computer not connected to the internet.

  DOWNLOAD THE COMPLETE PROJECT

DESIGN AND DEVELOPMENT OF INTERNET SECURITY PACKAGE

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON DESIGN AND DEVELOPMENT OF INTERNET SECURITY PACKAGE INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Azeez Abiodun
Moshood Abiola polytechnic
I actually googled and saw about iproject master, copied the number and contacted them through WhatsApp to ask for the availability of the material and to my luck they have it. So there was a delay with the project due to the covid19 pandemic. I was really scared before making the payment cause I’ve been scammed twice, they attended so well to me and that made me trust the process and made the payment and provided them with proof, I got my material in less than 10minutes
Very Good
JONNAH EHIS
Ajayi Crowther University, Oyo
I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!
Excellent
Oluchi From Michael Opara University
If you are a student and you have not used iprojectmaster materials, you are missing big time! iprojectmaster is the BEST
Excellent
Abraham Ogbanje
NATIONAL OPEN UNIVERSITY OF NIGERIA
At first I was afraid.. But I discovered they are legit. I will bring more patronize
Very Good
MATTHEW NGBEDE
Ahmadu Bello University
I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!
Excellent
Temitayo Ayodele
Obafemi Awolowo University
My friend told me about iprojectmaster website, I doubted her until I saw her download her full project instantly, I tried mine too and got it instantly, right now, am telling everyone in my school about iprojectmaster.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work
Very Good
Abdulrahman Jibrin
Nti Abaji
Nice one work prompt delivery tanx
Very Good
Emmanuel Essential
Kogi state University
I actually took the risk,you know first time stuff But i was suprised i received as requested. I love you guys 🌟 🌟 🌟 🌟
Very Good
Ibrahim Muhammad Muhammad
Usmanu danfodiyo university, sokoto
It's a site that give researcher student's to gain access work,easier,affordable and understandable. I appreciate the iproject master teams for making my project work fast and available .I will surely,recommend this site to my friends.thanks a lot..!
Excellent
Uduak From Uniuyo
IProjectMaster is the best project site for students. Their works are unique and free of plagiarism!
Excellent

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on DESIGN AND DEVELOPMENT OF INTERNET SECURITY PACKAGE?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on DESIGN AND DEVELOPMENT OF INTERNET SECURITY PACKAGE?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for DESIGN AND DEVELOPMENT OF INTERNET SECURITY PACKAGE, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!