DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1815
  • Access Fee: ₦5,000 ($14)
  • Pages: 44 Pages
  • Format: Microsoft Word
  • Views: 417
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of visual basic programming language and other programming language. For the first few decades of their existence, computer\ networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem. The requirements of information security within an organization have undergone two major changes in the last several decades before the widespread use of data processing equipment the security of information felt to be valuable to an organization was provided primarily by physical and administrative means with the introduction of computer the need for automated tools for protecting files and other information stored on the computer became an evident .this is especially the case for a shared system such as time sharing system and the need is even more acute for systems that can be accessed for a public telephone or a data network the generic name for the collection of tools to protect data and to thwart hackers is ―computer security‖. Network Security is a broad topic and covers a multitude of sins. In its simplest form, it is concerned with making sure that nosy people cannot read, or worse yet, secretly modify messages intended for other recipients. It is concerned with people trying to access remote services that they are not authorized to use. Most security problems are intentionally caused by malicious people trying to gain some benefit, get attention, or to harm someone. Network security problems can be divided roughly into four closely intertwined areas: secrecy, authentication, non repudiation, and integrity control. Secrecy, also called confidentiality, has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when people think about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. Non repudiation deals with signatures.

 

TABLE OF CONTENT

Title page i

Approval page ii

Certification iii

Dedication iv

Acknowledgement v

Abstract vi

Table of content vii

CHAPTER ONE

1.0 Introduction 1

1.1 Statement of the problem 5

1.2 Purpose of study 6

1.3 Aims and objective of the study 6

1.4 Scope of study 7

1.5 Limitations 7

1.6 Assumptions 7

1.7 Definition of terms 8

CHAPTER TWO

2.0 Literature review 10

CHAPTER THREE

3.0 Description and analysis of the existing system 16

3.1 Fact Finding Method Used 16

3.2 Objective of the existing system 17

3.3 Organizational chart 18

3.4 Input/process/output analysis 19

3.5 Information flow diagram 20

CHAPTER FOUR

4.0 Design of new system 21

4.1 Output specification and design 21

4.2 Input specification and design 22

4.3 File design 23

4.4 Procedure chat 23

4.5 System flowchart 24

CHAPTER FIVE

5.0 Implementation 26

5.1 Program design 26

5.2 Program flowcharts 28

5.3 Documentation 29

5.4 Recommendation 30

5.5 Conclusion 30

5.6 Summary 32

Reference 35

Appendix I 36

Appendix II 37

DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1815
  • Access Fee: ₦5,000 ($14)
  • Pages: 44 Pages
  • Format: Microsoft Word
  • Views: 417
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1815
    Fee ₦5,000 ($14)
    No of Pages 44 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of... Continue Reading
    ABSTRACT Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of... Continue Reading
    ABSTRACT Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM  CHAPTER TWO LITERATURE REVIEW 1.0            SECURITY CONCEPT Security is defined in many ways due to the many contexts of its existence.  In other words, security generally has to do with protection.  It might be protection from undue access.  Some attributes... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the different machines used in information processing system to reduce the... Continue Reading
    ABSTRACT The fundamental aim of this project “Design and Implementation of Network Based Security Information System” is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It... Continue Reading
    ABSTRACT The fundamental aim of this project “Design and Implementation of Network Based Security Information System†is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also... Continue Reading
    ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the... Continue Reading
    Call Us
    whatsappWhatsApp Us