Our Archives

Call 08068929770 or 08122972656 for any enquiries.

Project Topic:

WINDOW ACCESS CONTROL SYSTEM: ITS DESIGN AND IMPLEMENTATION

Project Information:

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 44 ::   Attributes: source code
::   202 people found this useful

Project Body:

ABSTRACT

The relevance of this study cannot be overemphasize because it tend to revealed the impact and effect of Window Access Control Security System. It main focus of this system is to designed a system that would be able to handle security process (aspect) in a computer system The system was studied and relevant officials were interview to acquire the required data. This designed new system allows easily information retrieval of accurate information for effective and efficient allocations. Easy maintenance of information integrity as well as time saving and reduction in operation. The system design is visual basic 6.0 because it is interactive, menu- driven and user friendly. It provides a timely information: about students. Most students information operations are recorded and stored in the computer and retrieved at willed. It ensures security in windows and also access some vital software online. It is recommend that private and public enterprises should make use of the newly developed system.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

TABLE OF CONTENTS

Title Page    -        -        -        -        -        -        -        -        -        i

Certification         -        -        -        -        -        -        -        -        -        ii

Dedication -        -        -        -        -        -        -        -        -        iii

Acknowledgement         -        -        -        -        -        -        -        iv

Abstract      -        -        -        -        -        -        -        -        -        v

Table of Contents -        -        -        -        -        -        -        -    vi-viii

 

CHAPTER ONE – INTRODUCTION

1.0     Introduction         -        -        -        -        -        -        -        -        1-2

1.1     Theoretical Background -        -        -        -        -        -        3

1.2     Statement of Problem    -        -        -        -        -        -        3-4

1.3     Aims and Objectives of the Study     -        -        -        -        4

1.4     Significance of the Study                  -        -        -        -        -       5-6

1.5     Scope of the Study                  -        -        -        -        -        -        6

1.6     organization of the Research   -        -        -        -        -        7

1.7     Definition of Terms       -        -        -        -        -        -        7

 

CHAPTER TWO: LITERATURE REVIEW

2.0     Introduction                   -        -        -        -        -        -        -        8

2.1     Concept of Windows Access Control         -        -        -        -        9-13

2.2     Types of Windows Access Control   -        -        -        -        13-15 

2.2.1  Policies, Models and Mechanism      -        -        -        -        15-22

2.3     Windows Account Overview   -        -        -        -        -        22-23

2.4     Logical Model of Access-Control Interaction       -        -        -      23-26

2.4.1  Security Bugs Found          -           -         - -        -        -        26-27 

2.5     Access Control List (ACL) and Limitation        - -        -        27-29

 

CHAPTER THREE: SYSTEM DESIGN AND ANALYSIS

3.0     Introduction         -        -        -        -        -        -        -        -        30

3.1     Research Methodology -        -        -        -        -        -        30

3.2     System Analysis -        -        -        -        -        -        -        30

3.2.1  Analysis of the Existing System                 -        -        -        -        30

3.2.2  Problem of the Existing System        -        -        -        -        -        31

3.2.3  Analysis of the Proposed System     -        -        -        -        31

3.2.3.1        Advantages of the Proposed System          -        -        -        31

 3.2.3.2       Disadvantages of the Proposed System      -        -        31

3.3     System Design     -        -        -        -        -        -        -        32

3.3.1  Input Layout        -        -        -        -        -        -        -        32

3.3.2  Program Flowchart        -        -        -        -        -        -        32

3.3.3  Output Format     -        -        -        -        -        -        -        32       

CHAPTER FOUR -      SYSTEM IMPLEMENTATION AND DOCUMENTATION

40      Introduction         -        -        -        -        -        -        -        33

4.1     System Design Diagram          -        -        -        -        -        -        33

4.2     Choice of Programming Language    -        -        -        -        33

4.3     Analysis of Modules      -        -        -        -        -        -        33

4.4     Programming Environment     -        -        -        -        -        34

4.4.1  Hardware Requirement  -        -        -        -        -        -        34

4.4.2  Software Requirement   -        -        -        -        -        -        34

4.5     Implementation    -        -        -        -        -        -        -    43-44

 

CHAPTER FIVE     –    SUMMARY, CONCLUSION AND

RECOMMENDATION

5.0     Introduction         -        -        -        -        -        -        -        -        45

5.1     Constraints of the Study         -        -        -        -        -        -        45

5.2     Summary    -        -        -        -        -        -        -        -        45

5.3     Conclusion -        -        -        -        -        -        -        -        46

5.4     Recommendations         -        -        -        -        -        -        -        46

References  -        -        -        -        -        -        -        -        46

Appendix A (Program Flowchart)    -        -        -        -    47-51

Appendix B (Source Code)     -        -        -        -        -    52-57

Appendix C (Output Format) -        -        -        -        -    58-60

 

 

 

 

 

 

 

 

 

 

CHAPTER ONE

INTRODUCTION

1.0     Introduction

In computer security, window access control (WAC) refers to a type of access control which the operating system (OS) constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, input and output devices etc. Subjects and objects each have a set of security attributes.

Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kennel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object will be tested against the set of authorization rules (aka policy) to determine if the operation is allowed. According to Pete Sclafani (2002), database management system, in its access control mechanism, can also apply window access control. With window access control, this security policy is centrally controlled by a security policy administrator. Users do not have the ability to override the policy to grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects to access objects, allows users the ability to make policy decisions or assign security attributes. WAC-enabled systems allow policy administrators to implement organization-wide security policies. Unlike with DAC, users cannot override or modify this policy, either accidentally or intentionally. This allows security administrators to define a central policy that is guaranteed (in principle) to be enforced for all users. According to Barkley J., (1997) MAC has been closely associated with multi-level secure (MLS) systems. The Trusted Computer System Evaluation Criteria (TCSEC), the seminal work on the subject which is often referred to as the "Orange Book", defines WAC as "a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity". Early implementations of WAC such as Honeywell's SCOMP, USAF SACDIN, NSA Blacker, and Boeing's MLS LAN focused on MLS to protect military-oriented security classification levels with robust enforcement. Originally, the term WAC denoted that the access controls were not only guaranteed in principle, but in fact. Early security strategies enabled enforcement guarantees that were dependable in the face of national lab level attacks. More recently, with the advent of implementations such as SELinux (incorporated into Linux kernels, Window Integrity Control (incorporated into Windows Vista and newer), and window schemes derived from the FreeBSD WAC Framework in OS, iOS, and Junos, WAC has started to become more mainstream and is evolving out of the MLS niche. These more recent WAC implementations have recognized that the narrow TCSEC definition, focused as it was on MLS, is too specific for general use Cavale M., and McPherson D., (2003). These implementations provide more depth and flexibility than earlier MLS-focused implementations, allowing (for example) administrators to focus on issues such as network attacks and malware without the rigor or constraints of MLS systems.

 

  1.           Theoretical Background

Many application programs demand too many privileges, more than strictly necessary to access the data on which they operate. Logical model of Windows XP access control, in a declarative but executable (Datalog) format. We have built a scanner that reads access-control configuration information from the Windows registry, file system, and service control manager database, and feeds raw configuration data to the model.

Adequate security of information and information systems is a fundamental management responsibility. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. Access control is concerned with determining the allowed activities of legitimate users, mediating every attempt by a user to access a resource in the system. In some systems, complete access is granted after successful authentication of the user, but most systems require more sophisticated and complex control. In some cases, authorization may mirror the structure of the organization, while in others it may be based on the sensitivity level of various documents and the clearance level of the user accessing those documents. When we run this on a typical Windows installation managed by a careful systems administrator, and several exploitable user-to-administrator and guest-to-any-user vulnerabilities caused by misconfigurations in the default installation of software from Adobe, AOL, Macromedia, Microsoft and some anonymous vendors.

 

  1.           Statement of Problem

Window access control system with access controls has historically implied a very high degree of robustness that assures that the control mechanisms resist subversion, thereby enabling them to enforce an access control policy that is mandated by some regulation that must be absolutely enforced for classified information.

For WAC, the access control decision is contingent on verifying the compatibility of the security properties of the data and the clearance properties of the individual (or the process proxying for the individual). The decision depends on the integrity of the metadata (e.g. label) that defines the security properties of the data, as well as the security clearance of the individual or process requesting access.

 

  1.           Aim and Objectives of Study

This project aim primary at developing a window access control system that will help to secure unauthorized access to the computer system file or important document.  This project is aimed to develop a computerized software program that enforces user authentication and authorization for users of m-desk, and thereby solve the problems derived from the fact that the DICOM standard does not specify a way to place restrictions on the resources a PACS may provide.

The project also has the ambition to simplify the administration of m-desk.

That is, the administration regarding the set-up of the DICOM application between m-desk and the WAC. In order to be able to place any restrictions on the resources provided by a WAC, the program should be located logically between the clients and the window.

 

  1.           Purpose of he Study

The purpose of this study is to provide and to promote the level of security measure in an organization and in individual household. The is aimed at developing or designing a software that will be able to guard the computer from been access in such a way that intruders are not given a bit chance to introduce themselves to the computer system.

 

  1.           Significance of the Study

Obviously the design of this window access control system is expected to be a guard to any unauthorized access to computer files without adequate permission from the administrator. It help will the organization to be able to secure their document and files from been access by unknown users. This window access control system will help to restore the clients and organization goodwill’s about keeping their file and relevant document. To some organization or individual who might likely prefer having their document save in the computer will be to relief from fact of fear of sabotage.The research will go a long way to alleviate the problem fraud in financial industries.With the advent of this idea or development, files and important document are solely secured.

 

 1.6    Scope of the Study

 This research work will concentrate on a window access control system alone. The scope is covered from developing a software that will carry out the operation.

 

1.7     Limitations of the Study       

Some of the constraints, which made me not to cover this work wide are;

1.       Financial help which I needed most to carry out this project work

2.       Economic uncertainty in the country

3.       No access to materials related to the topic.

 

 1.8    Organization of the Study

The research work is organized into five chapters.

Chapter one is the introduction, theoretical background, statement of the problems, objectives of the study, significance of the study, organization of the research, scope and limitations of the study and definition of terms.

Chapter two contains the review of related literature.

Chapter three is about the system design and methodology used in gathering information for the research work.

Chapter four elucidates about the implementation of the system, chapter talks about the summary, conclusion and recommendations.

 

1.9     Definition of Terms

Access: - This way or an opportunity for someone to use something either in a negative or positive way.

Principal: - several measurement techniques used in the life science to gather data for many more variables per sample        that the typical number of sample assayed.

Policy: - This is a principal or protocol to guide decision making to achieve rational outcome. A policy is a statement              of intend and implemented as a procedure or protocol.

Security: - This is the protection of information asset through the use of technology, process and training. Is equally the degree of resistance to or protection from harm. It implies to any vulnerable and valuable asset such as person, dwelling, community, nation or organization.

Window: - this is an operating system which is an interface or bridge between computer hardware and software. The hardware is really hard to understand by using the software we made soften the things and forgot about the hardness of the hardware so window is and user friendly interface between computer and user.

 

Project Department:

MORE COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS


Get The Complete Project »

Instantly Share this Project On Social Media:

CLOSELY RELATED COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS

A SURVEY OF DATA BASE MANAGEMENT IN ENHANCING THE WORK PERFORMANCE OF OTM GRADUATES IN SELECTED ORGANISATIONS IN ABUJA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 61 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   353 engagements

CHAPTER ONE 1.1. BACKGROUND OF THE STUDY A database is an organized collection of data.[1] It is the collection of schemes, tables, queries, reports, views and other objects. The data is typically o...Continue reading »

A STUDY INTO THE CHALLENGES AND PROSPECTS OF MARKETING NIGERIAN MADE COMPUTER SOFTWARES

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   295 engagements

CHAPTER ONE 1.1. Background to the Study Made-in-Nigeria softwares are those that are produced within Nigeria. Nigeria as a third world country needs to produce its own software so that it will help...Continue reading »

AN APPRAISAL OF THE ROLE OF ICT AS A CHANGE AGENT FOR QUALITY EDUCATION IN TERTIARY INSTITUTION IN NIGERIA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 64 ::   Attributes: Questionnaire, Data Analysis,Abstract

CHAPTER ONE INTRODUCTION 1.1. BACKGROUND OF THE STUDY Quality assurance in the education system is a concept consisting of lot of activities that are designed to improve the quality of input, proce...Continue reading »

ASSESSMENT OF THE UTILIZATION OF INTERNET SERVICES AMONG STUDENTS IN FEDERAL INSTITUTIONS IN KADUNA STATE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 69 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   441 engagements

CHAPTER ONE INTRODUCTION The convergence of information and communication technologies as typified by the Internet is increasingly having more influence on all aspects of the society as it has becom...Continue reading »

AUTOMATED DATA ANALYSIS OF LABORATORY TEST RESULTS AND ITS SCIENTIFIC IMPORTANCE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 59 ::   Attributes: Sort code, Abstract  ::   286 engagements

CHAPTER ONE 1.1. Introduction As an authentic measure to curb mortality rate, it is important to know the diseases that contribute to increasing mortality rate. Laboratory test results provide inform...Continue reading »

AUTOMATED MARKET BASKET ANALYSIS SYSTEM

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Sort code, Abstract  ::   262 engagements

CHAPTER ONE 1.0 INTRODUCTION Data mining is described as the extraction of hidden helpful information from a collection of huge databases, data mining is also a technique that encompasses an enormou...Continue reading »

What are you looking for today?

TESTIMONIALS:

  • 1. Rita Eze from abia state university said "thank you so much for your sincerity; i will tell my friends about you guys.".
    Rating: Very Good
  • 2. JULIET from UNIMAID said "I THANK YOU GUYS FOR BEING HONEST.....I WILL TELL MY FRIENDS ABOUT YOU GUYS. THANKX SO MUCH".
    Rating: Excellent
  • 3. Lilian Terdoo from BSU said "i have nothing to say but thanx for being honest. i appreciate u guys...".
    Rating: Very Good
  • 4. Demien Johnson from UNN said "Uniprojectmaterials is a blessing to researchers. my job was eased up by you guys. your jobs have good quality and was delivered on time to me. Thanks a million times".
    Rating: Very Good
  • 5. Patience from unilag said "i was having difficulties handling my dissertation of 12000 words. until i stumbled on uniprojectmaterials, my work was ready in three days with high quality write up and excellent data analysis, i will tell all my friends about u guys. Mr Donald is a very nice person, he should be in charge of the phone. he attended to me very well. God bless. ".
    Rating: Excellent
  • 6. James Ike from College of Education, Gindiri said "Great delivery. Una dey try wella!!!".
    Rating: Excellent

Paper Information

Format:ms word
Chapter:1-5
Pages:44
Attribute:source code
Price:₦3,000
Get The Complete Project »

Best Selling Projects

Our Archives