DESIGN AND DEVELOPMENT OF INTERNET SECURITY PACKAGE

By

Author

Presented To

Department of Computer Science

DESIGN AND DEVELOPMENT OF INTERNET SECURITY PACKAGE

(A Case Study Of Access Point Communication Limited Umuahia)

ABSTRACT
This project study is focused on the design and development of security package for the Access Point Communication Limited.
This research work came to existence the time when internet café business is becoming very popular and vast. The principal objective of this project is to stop or deny access to an unauthorized user and also to ensure proper accountability of cash received by the ticketers. Therefore the design and development of this internet security package for Access Point Limited is worth while.
This project covers all the general procedure involved in the design and development of a reliable in-house software application package that will provide automated Customer services for a cyber café. These procedures include the initial
Design, coding, testing, implementation, maintenance and enhancement of the new system. Thus this software will provide an accurate timing and billing information at any point in time for a cyber café operation
TABLE OF CONTENT
Title page 
Certification 
Dedication 
Acknowledgement 
Abstract 
Table of contents

CHAPTER ONE
11 BACKGROUND OF THE STUDY 

12 Statement of Problem 
13 Objective of the Project 
14 Significance of the project 
15 Scope of study 
16 Limitations 
17 Definition of term

CHAPTER TWO
20 LITERATURE REVIEW 

21 What is internet? 
22 Origin of Internet
23 Services provided by Internet 
24 Internet Security 
241 Internet Security problems 
242 Problems of Internet Security problem 
25 Efforts to solve Security Problems

CHAPTER THREE
30 ANALYSIS OF THE EXISTING SYSTEM 

31 Introduction 
32 Research Methodology 
33 Detailed Analysis of the Existing System 
331 Organizational / Companies Profile
332 The Organizational Structure of Different Section 
333 Data Flow Diagram of the Existing System 
34 Weakness of the Existing System 
341 Analysis and Design of the New System 
342 Objective of the New System 
343 Program Design 
344 Process Description of the New System 
35 Control System Menu 
36 File Attribute (Data Base Specification) 
37 Administration Log in Data Base 
38 Customers Log in Module Input and Screen Output 
39 Add New Member Module Input and Screen Output 
310 Admin Change Password Module Screen Output 
311 Daily Report Input and Screen Output 
312 Exit Program Module Input and Output Screen
313 Program Coding Platform 
314 Choice of Programming Language 
315 Output Design

CHAPTER FOUR 
40 SYSTEM IMPLEMENTATION AND DOCUMENTATION 

4 1 System Implementation 
42 System Requirement
43 Hardware Requirement 
44 Software Requirement 
45 System Test-Run 
46 System Changeover
47 Program Documentation
48 Running the Program 
49 System Maintenance

CHAPTER FIVE
50 SUMMARY, CONCLUSION AND RECOMMENDATION 

51 Summary 
52 conclusions 
53 Recommendations 
References 
Appendices
Appendix A: Program Listing
Appendix B: Sample Output
Appendix c: System Flowcharts

CHAPTER ONE

11 BACKGROUND OF THE STUDY 
The Internet has been described as the most revoluntary communication development of last century It has changed everything about every type of business and there seems no end in sight to the advantages this phenomenon can bring to this enhancement of business communications The Internet is a system for providing communication links between computers via local companies referred to as Internet of computer networks that is changing the way organizations and individuals communicates and do business
However, the major drawback is the security risks associated with it The Internet suffers from a significant and widespread security problems Perhaps, most important of all reason adduced for the poor security facilities on the internet may be the fact that was not designed to every secure: open access for the purpose of research was the prime motivation for the internet at the time of its conception Other factors responsible for the security lapse of the internet which is based on the TCP/IP (Transmission Control Protocol/Internet Protocol) suite of protocol A number of TCP/IP (Transmission Control Protocol/ Internet Protocol) suites of protocols A number of TCP/IP services are not secured and compromised by knowledgeable hackers A number of security problems can be remedied or reduced through the use of this software and control for host security

12 STATEMENT OF PROBLEMS 
Some of the problems with the internet security are as a result of inherent vulnerabilities in the services (and the protocols that the services implement), while others are as a result of host configuration and access controls that are poorly implemental or overly complex to administer Additionally, the role and importance of system management is often short-changed in job description resulting in many administrators begin at best, part-time and poorly prepared
Further more, the unavailability of experts who will carry the job for the people Also the cost at which people or individuals will undergo before acquiring one will also arise to be a problem

13 OBJECTIVES OF THE PROJECT 
The objective of this research work is to develop a client billing software program with modification of existing software and eliminating the entire obstacle in previous version of the numerous existing clients billing software program Apart from producing an enhancement,
It will also:
i prepare daily account of all transaction with clients 
ii Produce analyzed report for decision making
iii Provide security to enhance system lock when credit expires
iv Automatically generate numbers as ID’S and allocate time and payments by clients
v Enable the system within the network to identify user with particular name and password

14 SIGNIFICANCE OF THE PROJECT
Like any other application development the significance of this project is to make internet café business much more profitable to the investors
An internet café without effective security will gradually die because of pester and cashier stall time spend by clients 
This software is intended to stop the death of internet café’s with attendant un employment in the space This will be facilitated by the development of automated technique ie café billing to check time automatically

15 SCOPE OF STUDY 
This project work or study is aimed at designing and developing a time billing software for the Access Point Communication Limited
Furthermore, it is also aimed at saving the management of the access point communication limited the trouble and difficulties in running an internet café manually

16 LIMITATION 
The main problem encountered or the constraints in the course of this research were with the initial difficulty in grasping the knowledge of the field, which was quite alien to the researcher Though this was overcame within a short period of time
Also, the obtaining of accurate and complete information from the case study (Access Point Communication Limited) was somewhat inhibited The researcher had to do some independent investigations and internet browsing to ensure that relevant information was used
Finally, the issue of time can not be forgotten This was a very limited time to carry out the research or the project and also limited time to produce the project work

17 DEFINITION OF TERMS
INTERNET: this is an act linking several computers in the world in a wide area network
E-MAIL: the term electronic mail is used to describe various system of sending data or message electronically via the telephone Network or other data network, through a central computer without the need to post letters
SECURITY: this is an act of safeguarding a file or a document in order to allow unauthorized access 
FLOWCHART: This is the diagrammatic representation of the program components using standard symbols
HARDWARE: this is the physical part of a computer system
SOFTWARE: This is the program that controls the computer operation
DATABASE: A collection of interrelated data stored with controlled redundancy to serve one or more application 
MICRO SOFT VISUAL BASIC: This is software which allows you to develop your own software 
WWW: - This stands for World Wide Web which consists of the different website which you can visit 
NEWS GROUP: These are meeting please for people discussing special topic
NETWORK SERVERS: These are devices used to manage how the various resources on the network are shared
HACKING: A hacker is people who attempt to invade the privacy of a system Hackers are normally skilled programmers 
METHODOLOGY: A methodology is a collection of procedure techniques, tools and documentation aids which will help the system developer in their effort to implement a new information system, Abdul j I 
ONLINE: This is the direct connection to the computers through the internet and under the influence of the computer CPU 
OFFLINE: This is the process of the computer not connected to the internet

Learn and Obtain Diploma in Web development, Software development, Business, Technology and Creative Skills taught by industry experts. Explore a wide range of skills with our professional tutorials.

About E-Project Material Centre


E-Project Material Centre is a web service aimed at successfully assisting final year students with quality, well researched, reliable and ready made project work. Our materials are recent, complete (chapter 1 to Minimum of Chapter 5, with references) and well written.INSTANT ACCESS! INSTANT DOWNLOAD. Simply select your department, choose from our list of topics available and explore your data

Why Students Love to Use E-Project Material ?


Guaranteed Delivery Getting your project delivered on time is essential. You cannot afford to turn in your project past the deadline. That is why you must get your project online from a company that guarantees to meet your deadline. e-Project Topics Material Centre is happy to offer instant delivery of projects listed on our website. We can handle just about any deadline you send our way. Satisfaction Guaranteed We always do whatever is necessary to ensure every customer's satisfaction

Disclaimer


E-Project Topics Material Centre will only provide projects as a reference for your research. The projects ordered and produced should be used as a guide or framework for your own project. The contents of the projects should be able to help you in generating new ideas and thoughts for your own project. It is the aim of e-Project Topics Centre to only provide guidance by which the projects should be pursued. We are neither encouraging any form of plagiarism nor are we advocating the use of the projects produced herein for cheating.

Terms and Condition


Using our service is LEGAL and IS NOT prohibited by any university/college policies You are allowed to use the original model papers you will receive in the following ways:
  • As a source for additional understanding of the subject
  • As a source for ideas for you own research (if properly referenced)
  • For PROPER paraphrasing ( see your university definition of plagiarism and acceptable paraphrase) Direct citing ( if referenced properly)
Thank you so much for your respect to the authors copyright