AUTOMATED SYSTEM LOCK

By

Author

Presented To

Department of Computer Science

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND

In primitive times, men lived more freely with each other, in little groups which later emerged into communities. They did not live in fear of being attacked nor do they think of attacking each other. However, as the population of men grew, men began to scatter and travel to different places and in the course of their movement began to encroach on other peole whom they meet and. Therefore some gathered even due to their evil nature and began to attack fellow men to loot whatever they can lay hold on without suffering to get it. Thus we hear of the bandits in wilderness places. Even the holy bible records that during the time when Saul was pursuing David, the people that gathered unto David were bandits, from which he formed a ferocious group that survived by attacking and looting other tribes. Thus man is faced with the duty of protecting what he treasures as there is bound to be attack or laundering of such treasured goods whatever it is. This has given rise to the idea of security (Adibe, 2005).

Even in African societies, we see local chiefs having security men sometimes called royal guards protecting the chief or King from any form of attack. We also see this form of protection wherever there is treasure. Men ensure that their treasure is protected from attack; as such there is a quest in man to protect what he have, knowing well that it is bound to come under attak or looting if not guarded (Wilgersworth, 1987).

In modern times, the currency of which activities drives on is information. Information is the bedrock of any moving organization. The new century with the advancement of technology has come to recognize information as the most treasured facility in any organization or society. Everything thrives on given information. However, while some information is for public consumption, some which are considered sensitive are kept secret or secured as making it public can trigger the downfall of the inventors or people who have such information ( ).

With the advancement of time and advancement in technology, man has invented the computer as the best device for storage of information. This information which means a lot to man, while it is for human use is not always allowed to everybody as some of them are meant to be kept secret (Aneke, 2008). These classes of information which are secret, man has come to see that just like men attacked each other in past, is accessed illegally by unauthorized persons. This we see in cases where a person’s account is illegally manipulated without his knowledge. Thus, men have come to invent security measures to curtail such ailment. Take for example in 1994; over a hundred intrusions were made by unidentified hackers into the Rome Laboratory, the U.S. Air Force’s main command and research facility. Using Trojan horse viruses, hackers were able to obtain unrestricted access to Rome’s networking systems and remove traces of their activities ( ). The intruders were able to obtain classified files such as air tasking order systems data and further more able to penetrate connected networks of National Aeronuatics and Space Administration’s Goddard Space Flight Center, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as trusted Rome center user. Now a technique called Ethical hack testing is used to remediate this issues.

With the advancement in technology, it is no longer new for us to see systems that are making use of security lock in a system; there is now automated lock security system, since automation itself is a cryptogram intelligible only to the few whom can understand it. But as technology spread, automated lock security system appears soon after. This is true for the society in which we find ourselves today.

Automated Security Lock is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security , is generally seen as the second layer in the security of a physical structure.

Automated lock security simply means the act of protecting something against attack; security is done as a result of safety (Demmy, 1989).

This is done to avoid the misuse of information relating to people of corporate bodies, whereby we protect our computer and data against unauthorized disclosure, modification and also secure the system against virus and damage that might be caused by external force.

During the ancient times, record keeping was done by means of primitive notches cut into wooden stick, on bone fragments or marks pressed in clay tables. They soon improved with the development of papyrus and calamus pen. The ancient record keeping was well in hand and reached its peak in Roman Republic and Roman Empire.

The census of 1890 turned out to be especially significant in the evolution of recorded machine processible form, for this census. Harman Hollevith developed the punched card as a unit record and invented machinery for processing these records some 60 years later, the first electronic computer was constructed and their application in record keeping system ushered in the era of computerization.

From this humble beginning of antiquity, record keeping has grown into gigantic dimensions with the advent of computer network, conferencing through computers and so on.

These have increased the vulnerability of data both in stored form during communication to wire tapping; saving and accessibility. Another reason is that complexity of interaction of individual with their governments. With these new dimension dangers surfaced private and confidential records could easily become public property. Thus endangering sensitive data and information of huge organizations like Banks, Government Parastatals among others.

A solution had to be found to this problem of insecurity of data. A common technique is to provide automated lock security to sensitive information.

Suppose two people A and B make use of a system and each has to prevent access from the other or from anybody who wishes to gain unauthorized access in that system,

How can they make sure that no other person access this message?

i. How can they ensure that nobody gains access into the system without authorization?

ii. How can they ensure or keep track of monitoring if attempt is made into hacking the system?

It can be seen that these present some real problem.

1.2 OBJECTIVE OF THE STUDY

· This project work is carried out to make sure for maximum computerized automated lock security system.

· It also proves the usefulness of computer in the case study.

· It will also enlighten the student in the course of studying relating to other fields of life.

· This project will also provide detailed information on the concept of automated lock security. The importance of computerization and the importance of automated lock security in the emerging technological area. There is always the need in lives of individuals and corporation for privacy and secrecy. The purpose of the study of this project is to provide security to computer data and information using an automatic locks system.

1.3 SCOPE OF THE STUDY

Security is required in any environment where information or items are not intended to be freely available to all. Depending on the medium through which this information is being passed across, different security measures are taken.

1.4 CONSTRAINTS

Considering the time when automation originated with other fields of knowledge the amount of published work on it is quite scanty. There was limited literature in this work.

Secondly was the issue of finance. Movement and research drained a lot of money from the students which made things during the course of the research work.

Fear: Organizations from which I made enquiries from tends to guard their knowledge on this aspect of study in the fear that any knowledge gained or made public poses a threat to the security effectiveness. This posed a lot of problem in the course of the study.

1.5 IMPORTANCE OF STUDY

The study work ensures that data (information) will be secured against unwanted bodies; by developing a better automated lock security system for organization or system where illegal access is to be prevented.

This study will also enable us to investigate a secured automated system. .

1.6 JUSTIFICATION OF THE STUDY

Organizations cannot afford to lose important data which is the live wire on which they run. Most organizations have information in their database which if it is illegally accessed can disrupt the entire organization.

Securing this kind of sensitive information is paramount as unauthorized access must be prevented using necessary measures.

1.7 ORGANIZATION OF THE PROJECT

The project is arranged in six chapters.

Chapter one takes a look at the background, objective, scope, constraints, importance, and limitation, definition of terms and organization of the project.

Chapter two takes a view of previously written work.

Chapter three talks about description and analysis of existing system, fact finding method applied, objective of the existing system Program flowchart, Information flow diagram, and Problem of existing system.

Chapter four hinges on design of the existing system, input specification, output specification, file design, procedure chart, system flow chart.

Chapter five discusses on implementation, program flowchart, pseudo code, program source code,

Chapter six is about documentation, recommendation and conclusion.

1.9 DEFINITION OF TERMS

i. Automated lock security: this is the protection of data against unauthorized disclosure modification or distraction

ii. Privacy: this is concerned with avoiding the misuse of information relating to people of corporate bodies.

iii. Data: data are raw fact

iv. Information: these are processed data

v. Cryptology: is the science concerned with the methods and paraphernalia employed in secret communication, (Encyclopedia Britannica, 1994)

vi. Cryptography: is the study of the principle and techniques by which information can be concealed in ciphers and later revealed by legitimate users employing the secret key but in which it is rather impossible or computationally inaccessible for an authorized person to do so.

Learn and Obtain Diploma in Web development, Software development, Business, Technology and Creative Skills taught by industry experts. Explore a wide range of skills with our professional tutorials.

About E-Project Material Centre


E-Project Material Centre is a web service aimed at successfully assisting final year students with quality, well researched, reliable and ready made project work. Our materials are recent, complete (chapter 1 to Minimum of Chapter 5, with references) and well written.INSTANT ACCESS! INSTANT DOWNLOAD. Simply select your department, choose from our list of topics available and explore your data

Why Students Love to Use E-Project Material ?


Guaranteed Delivery Getting your project delivered on time is essential. You cannot afford to turn in your project past the deadline. That is why you must get your project online from a company that guarantees to meet your deadline. e-Project Topics Material Centre is happy to offer instant delivery of projects listed on our website. We can handle just about any deadline you send our way. Satisfaction Guaranteed We always do whatever is necessary to ensure every customer's satisfaction

Disclaimer


E-Project Topics Material Centre will only provide projects as a reference for your research. The projects ordered and produced should be used as a guide or framework for your own project. The contents of the projects should be able to help you in generating new ideas and thoughts for your own project. It is the aim of e-Project Topics Centre to only provide guidance by which the projects should be pursued. We are neither encouraging any form of plagiarism nor are we advocating the use of the projects produced herein for cheating.

Terms and Condition


Using our service is LEGAL and IS NOT prohibited by any university/college policies You are allowed to use the original model papers you will receive in the following ways:
  • As a source for additional understanding of the subject
  • As a source for ideas for you own research (if properly referenced)
  • For PROPER paraphrasing ( see your university definition of plagiarism and acceptable paraphrase) Direct citing ( if referenced properly)
Thank you so much for your respect to the authors copyright