ATTENTION:
BEFORE YOU READ THE PROJECT WORK, PLEASE READ THE
INFORMATION BELOW. THANK YOU!
TO GET THE FULL PROJECT FOR THE TOPIC BELOW PLEASE
CALL:
08168759420,
08068231953
TO GET MORE PROJECT TOPICS IN YOUR DEPARTMENT,
PLEASE VISIT:
DESIGN AND
IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM
ABSTRACT
Having discovered the importance of
computers in al ranks and aspects of life, computer system is applicable to
almost all human activities and has been employed to automats most activities
especially in areas were management data is of outmost importance.
Due to unauthorized access to data in
database, repose disclosure or modification will invade individual process,
computers have been produced with an encipher and decipher package in various
computer language like C++, paschal, Fortran, visual basic etc. voting modified
from or RSA cipher encryption, the package is two keys are required. The two
keys are public key and secret key respectively.
The project is aimed at developing a
computer data security system using data, encryption know as cryptography to
LEECOM FINANCE AND INVESTMENT LTD. it also takes a look at the present data
security of LEECOM FINANCE AND INVESTMENT LTD, identifying the problems
encountered in carrying out these process.
ORGANIZATION OF WORK
This project contains seven chapter and
they are as follows: -
Chapter One: - It contain the
introductions of the project, stating the problem the reason why the project is
being written, the aim and objectives need of observation of the project, the
limitation of the project, the assumption and the definition of terms of the
project.
Chapter Two: - Is all about the
literature review of the project.
Chapter Three: - Highlight the
description and analysis of the existing system, the objectives of the existing
system, problem encountered in the system were also highlighted, the
limitations are also stated.
Chapter Four: - Entails the development
of the design of the new system, the input/output specification and design, the
file design, the system requirement.
Chapter Five: - Consists of
implantation of the program design, the program flowchart, pseudo code, the
source program and the test of run and also explained.
Chapter Six: - Talks about the
system, documentation program documentation and use documentation.
Chapter Seven: - Finally, talks
about the conclusion and recommendation of the project.
TABLE OF CONTENTS
Title Page
Organization of work
Table of content
Abstract
CHAPTER ONE
1.1 INTRODUCTION
1.2 Background of the
Study
1.3 Statement of the
Problem
1.4 Purpose of Study
1.5 Importance of
Significance of the Study
1.6 Scope and
Delimitation
1.7 Limitation
1.8 Assumption
1.9 Definition of Term
CHAPTER TWO
2.1 LITERATURE
REVIEW
CHAPTER THREE
3.1 Description and
Analysis of the Existing System
3.2 Facts Findings
Methods Used
3.3 Objectives of the
Existing System
3.4 Organizational
Structure
3.5 Input, Process and
Output Analysis
3.6 Information Flow
Diagram
3.7 Problem of the
Existing System
3.8 Justification for the
New System
CHAPTER FOUR
4.1 Design of the New
System
4.2 Input Specification
and Design
4.3 Output Specification
and Design
4.4 File Design
4.5 Production Chart
4.6 System Flow Chart
4.7 System requirements
CHAPTER FIVE
IMPLEMENTATIONS
5.1 Program Design
5.2 Program Flow Chart
5.3 Pseudo Code
5.4 Source Program
5.5 Test Run
CHAPTER SIX
DOCUMENTATION
CHAPTER SEVEN
RECOMMENDATION AND CONCLUSION
7.1
Recommendation
7.2
Conclusion
REFERENCE
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE
STUDY
When writing is new in a society, there
will not be any data security, since the script itself is a cryptogram
intelligible only to the few whom can read or write. But as literacy spread,
cryptology appears soon after. This is true for the society in which we fine
ourselves today.
According to Demmy (1989) data security
simply means the act of protecting something against attack, security is done
as a result of safety.
This is done to avoid the misuse of
information relating to people of corporate bodies, whereby we protect our
computer and data against unauthorized disclosure, modification and also security
the system against virus and damage that might be caused by external force.
During the ancient times, record
keeping was done by means of primitive notches cut into wooden stick, on bone
fragments or marks pressed in clay tables. They soon improved with the
development of papyrus and calamus pen. The ancient record keeping was well in
hand and reached its peak in Roman Republic and Roman Empire.
The census of 1890 turned out to be
especially significant in the evolution of recorded machine processible form,
for this census. Harman Hollevith has developed the punched card as a unit
record and invented machinery for processing these records some 60years later,
the first electronic computer was constructed and their application in record
keeping system ushered in the era of computerization.
From this humble beginning of
antiquity, record keeping has grow into gigantic dimensions wit the advent of
computer network, conferencing through computers and so on.
These have increased the vulnerability
of data both in stored form during communication to wire tapping; saving and
accessibility. Another reason is that complexity of interaction of individual
with their governments. With these new dimension dangers surfaced private and
confidential records could easily become public property. This endangering with
lives of people concern.
A solution had to be found to his
problem of insecurity of data. A common technique for providing data security
to sensitive information is encryption. Encryption entails the application of
certain reversible transformation; to the message to be transmitted to render
them unintelligent to all but those receivers who are in possession of the
correct “key” used to encryption.
The original message is decrypted by
applying the reverse transformation specified by the key to the received
encrypted message.
Suppose two people A and B wish to
communicate or exchange message on an issue they do not want to make public on
what they want to keep between them. A number of questions or problems arise.
These are: -
i.
How can they make sure that no other person receives this message?
ii.
How can A (B) make sure that B (A) receive all of A’s call of B’s message?
iii.
How can they make sure that they receive only these message and no other?
It can be seen that these present some
real problem. As an illustration let us consider a business deal between two
businessmen, A and B, geographically residing in two different areas and who
communication with each other in some way, example by E-mail, mail, telephone,
telex etc. another businessman Y, business vital Y, wishing to know what the
deal is all about, may be able to tap into the communication line thus leading
to problem.
As state above
i.
May rise in a situation whereby the vital Y, may decided to intercept
the message from A to B, say, causing a delay in the cause of the business
deal. This message might be easily detected if the recipient of the message
does not get it at the said time, unlike problem.
ii.
Whereby the message interception may be distorted or some message not there
before may be added to it before being sent to the recipient. In a situation
like this it is quite difficult to detect.
However, detection of an abnormal
situation does not imply that it can be determined who caused it. Thus to
ensure orderly communication of confidential message it is necessary that the
authenticity of message be proved conclusively at some later point in time to
any other party. Having established the fact that there is a multitude of
problems with the notion of communication on despite its deception simplicity,
and by extensions having decided that it is desirable to resolve this problem,
we now direct our attention to possible solution.
1.4 PURPOSE OF STUDY
This project work is carried out to
make sure for maximum computerized data security system. It also prove the
usefulness of computer in the case study. It will also enlighten the student in
the course of studying relating to other fields of life.
This project will also provided
detailed information on the concept of data security. The importance of
computerize and the importance of data security in the field. There is always
the need in lives of individuals and corporation for privacy and secrecy. The
purpose of study of this project of computer data and information.
1.5 IMPORTANCE OF STUDY
The study work ensures that data
(information) will be secured against unwanted bodies; by developing a better
data security system for the company (LEECON FINANCE AND INVESTMENT LIMITED).
This study will also enable us to
investigate a secured cryptosystem.
1.6 SCOPE
Security is required in any environment
where information or items are not intended to be freely available to all.
Depending on the medium through which this information is being passed across,
different security measures are taken.
The physical security of the hardwares
can be protected by conventional methods such as a secure room and cardkeys,
but the study of this is beyond the scope of this work.
However, within this work, will be
looking at one of the measure taken in security information when it is being
transmitting from the transmitter to the receiver. In this case the problem is
to write the message in such a way that an enemy or eavesdropper on the
communication medium (which could be a paper, information-theoretic channel or
a physical file on the computer system) cannot deduce or understand the content
is of the message.
AFFILIATE LINKS:
www.uniproject.com.ng
www.uniprojects.com.ng
www.uniprojectz.net
uni-project.net
hiwriters.com.ng
hiwriter.com.ng
hiwriters.net
hiwriter.net
jamtechproject.com.ng
jamtechprojects.com.ng
jamtechproject.net
jamtechprojects.net
www.easyprojectmaterials.com
www.easyprojectsolutions.com
www.worldofnolimit.com
www.easyprojectmaterials.com.ng
www.easyprojectsmaterial.com
www.easyprojectsmaterial.com.ng
www.easyprojectmaterial.com.ng
www.projectmaterial.com.ng
www.projectmaterials.com.ng
www.projectmaterials.com
www.myprojectmaterial.com.ng
www.myprojectmaterials.com
www.researchprojectmaterial.com
www.researchprojectmaterials.com
www.uniprojects.com.ng
www.uniprojectz.net
uni-project.net
hiwriters.com.ng
hiwriter.com.ng
hiwriters.net
hiwriter.net
jamtechproject.com.ng
jamtechprojects.com.ng
jamtechproject.net
jamtechprojects.net
www.easyprojectmaterials.com
www.easyprojectsolutions.com
www.worldofnolimit.com
www.easyprojectmaterials.com.ng
www.easyprojectsmaterial.com
www.easyprojectsmaterial.com.ng
www.easyprojectmaterial.com.ng
www.projectmaterial.com.ng
www.projectmaterials.com.ng
www.projectmaterials.com
www.myprojectmaterial.com.ng
www.myprojectmaterials.com
www.researchprojectmaterial.com
www.researchprojectmaterials.com
http://projstuf.blogspot.com.ng/
http://highwriter.blogspot.com.ng/
http://nairaprojects.blogspot.com.ng/
http://jamtechprojects.blogspot.com.ng/
http://preshstore.blogspot.com.ng/
http://laitosproject.blogspot.com.ng/
http://educprojects.blogspot.com.ng/
http://projectsalesng.blogspot.com.ng/
http://projstoc.blogspot.com.ng/
http://projectstreetng.blogspot.com.ng/
http://eazyprojectsmaterial.blogspot.com.ng/
http://eazyprojectsmaterials.blogspot.com.ng/
http://easeprojectsmaterials.blogspot.com.ng/
http://easeprojectmaterial.blogspot.com.ng/
http://easyprojectsmaterials.blogspot.com.ng/
http://mastersprojectmaterials.blogspot.com.ng/
http://easyprojectsmaterial.blogspot.com.ng/
http://projectchaptersng.blogspot.com.ng/
http://easeprojectmaterials.blogspot.com.ng/
http://easeprojectsmaterial.blogspot.com.ng/
http://easzprojectmaterial.blogspot.com.ng/
http://easzprojectmaterial.blogspot.com.ng/
http://projectchapters.blogspot.com.ng/
http://academicprojectworld.blogspot.com.ng/
http://projectsng.blogspot.com.ng/
http://projectfilesng.blogspot.com.ng/
http://projectmaterialng.blogspot.com.ng/
http://projectmaterialng.blogspot.com.ng/
http://projectdevelopersng.blogspot.com.ng/
http://myprojectsng.blogspot.com.ng/
http://projetsoft.blogspot.com.ng/
http://googleprojectsng.blogspot.com.ng/
http://projectdeveloperng.blogspot.com.ng/
http://tetproj.blogspot.com.ng/
http://highwriter.blogspot.com.ng/
http://nairaprojects.blogspot.com.ng/
http://jamtechprojects.blogspot.com.ng/
http://preshstore.blogspot.com.ng/
http://laitosproject.blogspot.com.ng/
http://educprojects.blogspot.com.ng/
http://projectsalesng.blogspot.com.ng/
http://projstoc.blogspot.com.ng/
http://projectstreetng.blogspot.com.ng/
http://eazyprojectsmaterial.blogspot.com.ng/
http://eazyprojectsmaterials.blogspot.com.ng/
http://easeprojectsmaterials.blogspot.com.ng/
http://easeprojectmaterial.blogspot.com.ng/
http://easyprojectsmaterials.blogspot.com.ng/
http://mastersprojectmaterials.blogspot.com.ng/
http://easyprojectsmaterial.blogspot.com.ng/
http://projectchaptersng.blogspot.com.ng/
http://easeprojectmaterials.blogspot.com.ng/
http://easeprojectsmaterial.blogspot.com.ng/
http://easzprojectmaterial.blogspot.com.ng/
http://easzprojectmaterial.blogspot.com.ng/
http://projectchapters.blogspot.com.ng/
http://academicprojectworld.blogspot.com.ng/
http://projectsng.blogspot.com.ng/
http://projectfilesng.blogspot.com.ng/
http://projectmaterialng.blogspot.com.ng/
http://projectmaterialng.blogspot.com.ng/
http://projectdevelopersng.blogspot.com.ng/
http://myprojectsng.blogspot.com.ng/
http://projetsoft.blogspot.com.ng/
http://googleprojectsng.blogspot.com.ng/
http://projectdeveloperng.blogspot.com.ng/
http://tetproj.blogspot.com.ng/
http://projectfaculty.blogspot.com.ng/
http://femsproject.blogspot.com.ng/
http://egoboosterbook.blogspot.com.ng/
http://projecttopicz.blogspot.com.ng/
http://goodprojecttopic.blogspot.com.ng/
http://worldofnolimit.blogspot.com.ng/
http://worldofnolimits.blogspot.com.ng/
http://careerstool.blogspot.com.ng/
http://afrilibs.blogspot.com.ng/
http://ngwriterz.blogspot.com.ng/
http://ngwriter.blogspot.com.ng/
http://projectmaterialz.blogspot.com.ng/
http://articlezng.blogspot.com.ng/
http://laittosprojectsolution.blogspot.com.ng/
http://blastyourprojectreloaded.blogspot.com.ng/
http://projectaider.blogspot.com.ng/
http://africle.blogspot.com.ng/
http://projectstocs.blogspot.com.ng/
http://ngprojectz.blogspot.com.ng/
http://projectscrew.blogspot.com.ng/
http://laittosprojects.blogspot.com.ng/
http://15projectz.blogspot.com.ng/
iproject01.blogspot.com
projectsaider.blogspot.com
projecttopicshq.blogspot.com
questias.blogspot.com
4myresearch.blogspot.com
hiwriterz.blogspot.com
jamtechprojectz.blogspot.com
projectzmaterial.blogspot.com
grossarchives.blogspot.com
classicprojectz.blogspot.com
allprojecttopic.blogspot.com
careerslite.blogspot.com
careerslit.blogspot.com
afribarys.blogspot.com
afrilibz.blogspot.com
360research.blogspot.com
http://femsproject.blogspot.com.ng/
http://egoboosterbook.blogspot.com.ng/
http://projecttopicz.blogspot.com.ng/
http://goodprojecttopic.blogspot.com.ng/
http://worldofnolimit.blogspot.com.ng/
http://worldofnolimits.blogspot.com.ng/
http://careerstool.blogspot.com.ng/
http://afrilibs.blogspot.com.ng/
http://ngwriterz.blogspot.com.ng/
http://ngwriter.blogspot.com.ng/
http://projectmaterialz.blogspot.com.ng/
http://articlezng.blogspot.com.ng/
http://laittosprojectsolution.blogspot.com.ng/
http://blastyourprojectreloaded.blogspot.com.ng/
http://projectaider.blogspot.com.ng/
http://africle.blogspot.com.ng/
http://projectstocs.blogspot.com.ng/
http://ngprojectz.blogspot.com.ng/
http://projectscrew.blogspot.com.ng/
http://laittosprojects.blogspot.com.ng/
http://15projectz.blogspot.com.ng/
iproject01.blogspot.com
projectsaider.blogspot.com
projecttopicshq.blogspot.com
questias.blogspot.com
4myresearch.blogspot.com
hiwriterz.blogspot.com
jamtechprojectz.blogspot.com
projectzmaterial.blogspot.com
grossarchives.blogspot.com
classicprojectz.blogspot.com
allprojecttopic.blogspot.com
careerslite.blogspot.com
careerslit.blogspot.com
afribarys.blogspot.com
afrilibz.blogspot.com
360research.blogspot.com
www.easymaterial.net
www.easyresearches.net
www.easymaterial.com.ng
www.easymaterials.com.ng
www.easyprojectmaterial.net
www.easyprojectmaterials.net
www.easyprojectsmaterials.net
www.easyprojectsmaterial.net
www.faculty.com.ng
www.department.com.ng
www.topics.com.ng
www.topic.com.ng
www.researches.com.ng
www.nairatopic.com
www.nairatopics.com
www.nairatopic.net
www.nairatopics.net
www.nairamaterial.com
www.nairamaterials.com
www.nairamaterial.net
www.nairamaterials.net
www.nairaresearch.com
www.nairaresearch.net
www.collegework.com.ng
www.collegeworks.com.ng
www.collegework.net
easyprojectmaterial.netwww.easyresearches.net
www.easymaterial.com.ng
www.easymaterials.com.ng
www.easyprojectmaterial.net
www.easyprojectmaterials.net
www.easyprojectsmaterials.net
www.easyprojectsmaterial.net
www.faculty.com.ng
www.department.com.ng
www.topics.com.ng
www.topic.com.ng
www.researches.com.ng
www.nairatopic.com
www.nairatopics.com
www.nairatopic.net
www.nairatopics.net
www.nairamaterial.com
www.nairamaterials.com
www.nairamaterial.net
www.nairamaterials.net
www.nairaresearch.com
www.nairaresearch.net
www.collegework.com.ng
www.collegeworks.com.ng
www.collegework.net
easyprojectsmaterial.net
easyprojectsmaterials.net
easyprojectmaterial.net.ng
easyprojectmaterials.net.ng
easyprojectsmaterials.net.ng
easyprojectsmaterial.net.ng
worldofnolimits.com
worldofnolimit.net
worldofnolimits.net
worldofnolimit.com.ng
worldofnolimits.com.ng
worldofnolimit.net.ng
worldofnolimits.net.ng
Comments
Post a Comment