Our Archives

Call 09159097300, or 09067754232 for any enquiries.

Project Topic:

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM A CASE STUDY OF LEECON FINANCE AND INVESTMENT LTD

Project Information:

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: source code ::   2,892 people found this useful

Project Body:

ABSTRACT

 

Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance.

Due to unauthorized access to data in database, repose disclosure or modification will invade individual process, computers have been produced with an encipher and decipher package in various computer language like C++, paschal, Fortran, visual basic etc. voting modified from or RSA cipher encryption, the package is two keys are required. The two keys are public key and secret key respectively.

The project is aimed at developing a computer data security system using data, encryption know as cryptography to LEECOM FINANCE AND INVESTMENT LTD. it also takes a look at the present data security of LEECOM FINANCE AND INVESTMENT LTD, identifying the problems encountered in carrying out these process.   

 

 

CHAPTER ONE

 

  1. INTRODUCTION

1.1   BACKGROUND OF THE STUDY

When writing is new in a society, there will not be any data security, since the script itself is a cryptogram intelligible only to the few whom can read or write. But as literacy spread, cryptology appears soon after. This is true for the society in which we fine ourselves today.

According to Demmy (1989) data security simply means the act of protecting something against attack, security is done as a result of safety.

This is done to avoid the misuse of information relating to people of corporate bodies, whereby we protect our computer and data against unauthorized disclosure, modification and also security the system against virus and damage that might be caused by external force.

During the ancient times, record keeping was done by means of primitive notches cut into wooden stick, on bone fragments or marks pressed in clay tables. They soon improved with the development of papyrus and calamus pen. The ancient record keeping was well in hand and reached its peak in Roman Republic and Roman Empire.

The census of 1890 turned out to be especially significant in the evolution of recorded machine processible form, for this census. Harman Hollevith has developed the punched card as a unit record and invented machinery for processing these records some 60years later, the first electronic computer was constructed and their application in record keeping system ushered in the era of computerization.

From this humble beginning of antiquity, record keeping has grow into gigantic dimensions wit the advent of computer network, conferencing through computers and so on.

These have increased the vulnerability of data both in stored form during communication to wire tapping; saving and accessibility. Another reason is that complexity of interaction of individual with their governments. With these new dimension dangers surfaced private and confidential records could easily become public property. This endangering with lives of people concern.

A solution had to be found to his problem of insecurity of data. A common technique for providing data security to sensitive information is encryption. Encryption entails the application of certain reversible transformation; to the message to be transmitted to render them unintelligent to all but those receivers who are in possession of the correct “key” used to encryption.

The original message is decrypted by applying the reverse transformation specified by the key to the received encrypted message.

Suppose two people A and B wish to communicate or exchange message on an issue they do not want to make public on what they want to keep between them. A number of questions or problems arise. These are: -

  1. How can they make sure that no other person receives this message?
  2. How can A (B) make sure that B (A) receive all of A’s call of B’s message?
  3. How can they make sure that they receive only these message and no other?

It can be seen that these present some real problem. As an illustration let us consider a business deal between two businessmen, A and B, geographically residing in two different areas and who communication with each other in some way, example by E-mail, mail, telephone, telex etc. another businessman Y, business vital Y, wishing to know what the deal is all about, may be able to tap into the communication line thus leading to problem.

As state above

  1. May rise in a situation whereby the vital Y, may decided to intercept the message from A to B, say, causing a delay in the cause of the business deal. This message might be easily detected if the recipient of the message does not get it at the said time, unlike problem.
  2. Whereby the message interception may be distorted or some message not there before may be added to it before being sent to the recipient. In a situation like this it is quite difficult to detect.

However, detection of an abnormal situation does not imply that it can be determined who caused it. Thus to ensure orderly communication of confidential message it is necessary that the authenticity of message be proved conclusively at some later point in time to any other party. Having established the fact that there is a multitude of problems with the notion of communication on despite its deception simplicity, and by extensions having decided that it is desirable to resolve this problem, we now direct our attention to possible solution.

 

1.4   PURPOSE OF STUDY

This project work is carried out to make sure for maximum computerized data security system. It also prove the usefulness of computer in the case study. It will also enlighten the student in the course of studying relating to other fields of life.

This project will also provided detailed information on the concept of data security. The importance of computerize and the importance of data security in the field. There is always the need in lives of individuals and corporation for privacy and secrecy. The purpose of study of this project of computer data and information.

 

1.5   IMPORTANCE OF STUDY

The study work ensures that data (information) will be secured against unwanted bodies; by developing a better data security system for the company (LEECON FINANCE AND INVESTMENT LIMITED).

This study will also enable us to investigate a secured cryptosystem.

 

1.6   SCOPE

Security is required in any environment where information or items are not intended to be freely available to all. Depending on the medium through which this information is being passed across, different security measures are taken.

The physical security of the hardwares can be protected by conventional methods such as a secure room and cardkeys, but the study of this is beyond the scope of this work.

However, within this work, will be looking at one of the measure taken in security information when it is being transmitting from the transmitter to the receiver. In this case the problem is to write the message in such a way that an enemy or eavesdropper on the communication medium (which could be a paper, information-theoretic channel or a physical file on the computer system) cannot deduce or understand the content is of the message.  

 

1.7   LIMITATION OF THE STUDY

Considering the time when cryptography originated with other fields of knowledge the amount of published work on it is quite scanty. This was mainly because most organization including government and military having discovered a good cryptographic method tends to guard their discovery in the fear that any cryptosystem made public hoses its effectiveness. This posed a lot of problem in the course of the study.  

 

1.8   ASSUMPTIONS

It is assumed that when the system is computerized there will be improvements in work operations. There will also be rapid improvement in general work flow.

 

  1. DEFINITION OF TERMS
  1. Data security: this is the protection of data against unauthorized disclosure modification or distraction
  2. Privacy: this is concerned with avoiding the misuse of information relating to people of corporate bodies.
  3. Data: data are raw fact
  4. Information: these are processed data
  5. Cryptology: as defined by the encyclopedia Britannica (1994:860) is the science concerned with the methods and paraphernalia employed in secret communication.
  6. Cryptography: is the study of the principle and techniques by which information can be concealed in ciphers and later revealed by legitimate users employing the secret key but in which it is rather impossible or computationally infensible for an authorized person to do so.

Get The Complete Project »

Project Department:

MORE COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS

Instantly Share this Project On Social Media:

CLOSELY RELATED COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS

A SURVEY OF DATA BASE MANAGEMENT IN ENHANCING THE WORK PERFORMANCE OF OTM GRADUATES IN SELECTED ORGANISATIONS IN ABUJA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 61 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   8780 engagements

CHAPTER ONE 1.1. BACKGROUND OF THE STUDY A database is an organized collection of data.[1] It is the collection of schemes, tables, queries, reports, views and other objects. The data is typically o...Continue reading »

A STUDY INTO THE CHALLENGES AND PROSPECTS OF MARKETING NIGERIAN MADE COMPUTER SOFTWARES

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   11331 engagements

CHAPTER ONE 1.1. Background to the Study Made-in-Nigeria softwares are those that are produced within Nigeria. Nigeria as a third world country needs to produce its own software so that it will help...Continue reading »

AN APPRAISAL OF THE ROLE OF ICT AS A CHANGE AGENT FOR QUALITY EDUCATION IN TERTIARY INSTITUTION IN NIGERIA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 64 ::   Attributes: Questionnaire, Data Analysis,Abstract

CHAPTER ONE INTRODUCTION 1.1. BACKGROUND OF THE STUDY Quality assurance in the education system is a concept consisting of lot of activities that are designed to improve the quality of input, proce...Continue reading »

ASSESSMENT OF THE UTILIZATION OF INTERNET SERVICES AMONG STUDENTS IN FEDERAL INSTITUTIONS IN KADUNA STATE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 69 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   8769 engagements

CHAPTER ONE INTRODUCTION The convergence of information and communication technologies as typified by the Internet is increasingly having more influence on all aspects of the society as it has becom...Continue reading »

AUTOMATED DATA ANALYSIS OF LABORATORY TEST RESULTS AND ITS SCIENTIFIC IMPORTANCE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 59 ::   Attributes: Sort code, Abstract  ::   6793 engagements

CHAPTER ONE 1.1. Introduction As an authentic measure to curb mortality rate, it is important to know the diseases that contribute to increasing mortality rate. Laboratory test results provide inform...Continue reading »

AUTOMATED MARKET BASKET ANALYSIS SYSTEM

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Sort code, Abstract  ::   7188 engagements

CHAPTER ONE 1.0 INTRODUCTION Data mining is described as the extraction of hidden helpful information from a collection of huge databases, data mining is also a technique that encompasses an enormou...Continue reading »

What are you looking for today?

TESTIMONIALS:

  • 1. Jayone from FPA said " I had a wonderful experience using UniProjectMaterials,though they did not deliver the material on time, but the content had good quality. I recommend UniProjectMaterials for any project research work.".
    Rating: Very Good
  • 2. Mugisha R from B.U, UGANDA said "Wow, this is great, your materials has helped me alot. Many blessings. I will inform my friends. Thanks. ".
    Rating: Very Good
  • 3. Nwachukwu Ruth Chinyerr from Michael okpara university of Agriculture,umudike said "I really appreciate this. Materials like this are good guides to writing a researchable project.".
    Rating: Good
  • 4. Ibrahim Salama from Kaduna said "Thanks You So Much Sir We Appreciate ".
    Rating: Excellent
  • 5. Ibrahim Salama from Kaduna said "Thanks You So Much Sir We Appreciate ".
    Rating: Excellent
  • 6. Mohammed A.B from Veterinary Laboratory, Zanzibar ,Tanzania said "You are doing good job to assists in research. God bless you.".
    Rating: Very Good

Paper Information

Format:ms word
Chapter:1-5
Pages:65
Attribute:source code
Price:₦3,000
Get The Complete Project »

Best Selling Projects

Our Archives