DESIGN AND IMPLEMENTATION OF COMPUTERISED ENCRYPTED DATABASE SYSTEM

  • 0 Review(s)

Product Category: Projects

Product Code: 00002993

No of Pages: 63

No of Chapters: 5

File Format: Microsoft Word

Price :

₦3000

  • $

ABSTRACT

This study was created in order to analyze and develop computerized data Encryption software that will help to protect and secure the data of Fugro Nigeria and its workers. It begins with an explanation of Encryption, its application, techniques and uses. It also examines the development of an Encryption system to enhance security, user identification and Company data transfer protection, and also to replace the older system of security which comprises non computerized methods like cabinets, use of padlocks and safes, with a stronger system which enables access protection, authorization, centralized storage and backup. There are various strategies and techniques used to design security systems. However, there are few that are as effective as encryption and decryption. One technique enforces the principle of least privilege to great extent, where an entity has only the privileges that are needed for its function.

 

 

 

 

TABLE OF CONTENTS

CHAPTER ONE

1.0       INTRODUCTION

1.1                  BACKGROUND OF THE STUDY

1.2                  STATEMENT OF PROBLEM

1.3                  OBJECTIVES OF THE STUDY

1.4                  SIGNIFICANCE OF THE STUDY

1.5                  SCOPE OF THE STUDY

1.6                  LIMITATION OF THE STUDY

1.7                  DEFINITION OF TERMS

 

 

CHAPTER TWO

2.0      LITERATURE REVIEW

2.1      ENCRYPTION

2.1.1   SOME FORMS OF ENCRYPTION PROTOCOL

2.1.2   TYPES OF ENCRYPTION ALGORITHM

2.1.3   METHODS OF ENCRYPTION ALGORITHM

2.2     THE ADVANCED ENCRYPTION STANDARD (AES)

2.2.1   DESCRIPTION OF THE CIPHER

2.3            DATA ENCRYPTION STANDARD (DES)

2.3.1    DES HISTORY AND CONTROVERSY

          2.4    INTERNET ENCRYPTION

2.4.1   ENCRYPTION METHODS

2.5   SYMMETRIC ALGORITHM VS ASYMMETRIC ALGORITHM

2.6     CIPHERS

2.7     CRYPTOGRAPHIC SYSTEM TECHNIQUES

2.8            APPLICATION OF CRYPTOGRAPHY

 

CHAPTER THREE

3.0     RESEARCH METHODOLOGY, ANALYSIS AND DESIGN

3.1     SYSTEM INVESTIGATIONS AND ANALYSIS

3.1.1  FACT FINDING

3.1.2  RESEARCH METHODOLOGY

3.1.3  METHODS OF DATA COLLECTION

3.1.4  ANALYSIS OF DATA

3.2     DESCRIPTION OF THE PRESENT SYSTEM

3.2.1  ANALYSIS OF THE PRESENT SYSTEM

3.3     WEAKNESS / PROBLEMS OF THE PRESENT SYSTEM

3.4     DESIGN OF THE PROPOSED SYSTEM

3.4.1  JUSTIFICATION OF THE PROPOSED SYSTEM

3.4.2  ENCRYPTION ALGORITHM TO BE USED IN DESIGNING THE PROPOSED SYSTEM,

3.6     INPUT SPECIFICATION

3.7     OUTPUT SPECIFICATIONS

3.8     ACTIVITY PROCEDURE

3.8.1  OVERALL DATA FLOW DIAGRAM OF THE PROPOSED SYSTEM

 

CHAPTER FOUR 

4.0     IMPLEMENTATION AND DOCUMENTATION

4.1     PROGRAM IMPLEMENTATION

4.2     SYSTEM IMPLEMENTATION

4.3     HARDWARE REQUIREMENTS

4.4            SOFTWARE REQUIREMENTS

4.5     PROCEDURE FOR CONVERSION

4.6        PROGRAM DOCUMENTATION

4.6.1  INSIGHT ON THE .NET FRAMEWORK

4.6.2    CHOICE OF PROGRAMMING LANGUAGE (VISUAL BASIC.NET)

4.6.3    HOW TO INSTALL THE SOFTWARE

4.6.4    SOFTWARE TESTING

 

CHAPTER FIVE

5.0     SUMMARY, CONCLUSION AND RECOMMENDATION

5.1     SUMMARY

5.2     CONCLUSION

5.3     RECOMMENDATION

APPENDIX: PROGRAM SOURCE CODES






CHAPTER ONE

1.0     INTRODUCTION

Information security is the means of securing data or information from loss, theft, destruction, corruption and unauthorized access. In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. That information can also be stored in computer database, hard drives, floppy disks and other means of data storage. Therefore information security helps to ensure privacy and also protection of personal information.

One of the techniques of one of achieving this purpose is “Cryptography”. Cryptographic techniques have been used to protect information since ancient times, but only individuals and organizations with extraordinary need for confidentiality like the military government had bothered to exert the effort required to implement it. But as time passed and information security grew larger due to everyday businesses, cryptography became one of the most important tools for privacy and also a means of access control or restriction.

One basic topic in cryptography is that of Encryption and Decryption. Encryption is defined as the conversion of information*written, readable text) to an unreadable form called cipher text, which is impossible to read except of those that posses the secret key or appropriate knowledge to decipher the message. Decryption on the other hand is the opposite of Encryption that is the transformation of the cipher text back to its original form. The process of Encryption and Decryption require the use of secret information called the key. Cryptography is one practical means of sending information over an insecure channel. These channels may be computer networks, telephone lines, wireless intercom system, internet, bank ATM etc. the increasing need of using electronic means to store data has extended the need to protect the same data from corruption destruction and unauthorized access. Such information could be banking information, academic information, sensitive database, hospital records, etc.

 

1.1     BACKGROUND OF THE STUDY

Security is a primary issue which means that staffs of Fugro Nigeria Limited need to ensure that any confidential information is kept safe from corruption, destruction, theft and unauthorized access. Transmitting sensitive information such as security of financial data requires a system that can ensure privacy. The reason for using cryptography for storing important information is to protect the confidentiality of information and also to improve productivity, integrity and to prevent unnecessary abuse.

The topic “design and implementation of a secured computer system, using data Encryption and Decryption” is an introduction of a security strategy to safeguard information stored and used by Fugro Nigeria Limited. It is achieved by Encrypting any confidential information put into it, using Encryption mechanism and then applying Decryption mechanism in order to extract the original information.

 

1.2     STATEMENT OF PROBLEM

The problem is security; the password method used in almost all commercial operating systems even those deployed in Fugro Nigeria Limited, is probably not very strong against a sophisticated attacker. The choice of data Encryption comes next for the reduction of unauthorized access of confidential files or company data.

 

1.3     OBJECTIVES OF THE STUDY

1.     The major objective of this study is to produce an Encryption software that will enhance data security in Fugro Nigeria Limited

2.     To highlight the features of information security

3.     To ensure that maximum protection and authentication of information is achieved

4.     To ensure that information access is to only authorized personnel of Fugro Nigeria Limited

5.     To highlight the dangers that may affect information

6.     To help enhance information integrity

7.     Implementation of a new Encryption Algorithm / Technique

8.     To help safeguard against information when transmitting data across channels.

 

1.4     SIGNIFICANCE OF THE STUDY

Due to the importance of encryption, most organizations have devoted so much effort to device access control measures that will prevent unauthorized persons from getting access to information that does not concern them. The significance of this study is to ensure the confidentiality, accountability, integrity and availability of information security and privacy in Fugro Nigeria Limited

 

1.5     SCOPE OF THE STUDY

The study is focused on designing an application using encryption and decryption techniques to safeguard the information stored in systems used by Fugro Nigeria Limited in order to improve security and secrecy of company data.

 

1.6     LIMITATION OF THE STUDY

Limitations encountered during this project study include

-         Poor power supply when developing software

-         Lack of good text and journals on cryptography

-         Inadequate finance

-         Time constraint

 

1.7     DEFINITION OF TERMS

ENCRYPTION:  This is the process of converting ordinary information into unreadable text/ cipher text

DECRYPTION:  This is the reverse of encryption, from cipher text to plain text

CIPHER: Algorithm that handles the encryption and decryption process

CIPHER TEXT: The unreadable text created after encryption

KEY: Secret parameter that determines the functional output of the crypto algorithm or cipher

ALGORITHM:   A series of well defined steps that can be followed to achieve a task or goal.

Click “DOWNLOAD NOW” below to get the complete Projects

FOR QUICK HELP CHAT WITH US NOW!

+(234) 0814 780 1594

Buyers has the right to create dispute within seven (7) days of purchase for 100% refund request when you experience issue with the file received. 

Dispute can only be created when you receive a corrupt file, a wrong file or irregularities in the table of contents and content of the file you received. 

ProjectShelve.com shall either provide the appropriate file within 48hrs or send refund excluding your bank transaction charges. Term and Conditions are applied.

Buyers are expected to confirm that the material you are paying for is available on our website ProjectShelve.com and you have selected the right material, you have also gone through the preliminary pages and it interests you before payment. DO NOT MAKE BANK PAYMENT IF YOUR TOPIC IS NOT ON THE WEBSITE.

In case of payment for a material not available on ProjectShelve.com, the management of ProjectShelve.com has the right to keep your money until you send a topic that is available on our website within 48 hours.

You cannot change topic after receiving material of the topic you ordered and paid for.

Ratings & Reviews

0.0

No Review Found.


To Review


To Comment