+234 813 0686 500
+234 809 3423 853
info@grossarchive.com

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM A CASE STUDY OF LEECON FINANCE AND INVESTMENT LTD

  • Type:Project
  • Pages:57
  • Format:Microsoft Word
(Computer Science Project Topics & Materials)
ABSTRACT

Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance. 
Due to unauthorized access to data in database, repose disclosure or modification will invade individual process, computers have been produced with an encipher and decipher package in various computer language like C++, paschal, Fortran, visual basic etc. voting modified from or RSA cipher encryption, the package is two keys are required. The two keys are public key and secret key respectively. 
The project is aimed at developing a computer data security system using data, encryption know as cryptography to LEECOM FINANCE AND INVESTMENT LTD. it also takes a look at the present data security of LEECOM FINANCE AND INVESTMENT LTD, identifying the problems encountered in carrying out these process.    


TABLE OF CONTENTS

Title Page 
Certification 
Dedication 
Acknowledgement 
Organization of work
Table of content 
Abstract 

CHAPTER ONE
1.1 INTRODUCTION 
1.2 Background of the Study 
1.3 Statement of the Problem 
1.4 Purpose of Study 
1.5 Importance of Significance of the Study 
1.6 Scope and Delimitation 
1.7 Limitation 
1.8 Assumption 
1.9 Definition of Term 

CHAPTER TWO 
2.1 LITERATURE REVIEW  

CHAPTER THREE 
3.1 Description and Analysis of the Existing System 
3.2 Facts Findings Methods Used 
3.3 Objectives of the Existing System 
3.4 Organizational Structure 
3.5 Input, Process and Output Analysis 
3.6 Information Flow Diagram 
3.7 Problem of the Existing System 
3.8 Justification for the New System 

CHAPTER FOUR
4.1 Design of the New System 
4.2 Input Specification and Design 
4.3 Output Specification and Design
4.4 File Design 
4.5 Production Chart 
4.6 System Flow Chart 
4.7 System requirements

CHAPTER FIVE 
IMPLEMENTATIONS 
5.1 Program Design 
5.2 Program Flow Chart 
5.3 Pseudo Code 
5.4 Source Program
5.5 Test Run

CHAPTER SIX
DOCUMENTATION 

CHAPTER SEVEN
RECOMMENDATION AND CONCLUSION 
7.1 Recommendation 
7.2 Conclusion 
REFERENCE
 

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM A CASE STUDY OF LEECON FINANCE AND INVESTMENT LTD

Share This

Details

Type Project
Department Computer Science
Project ID CPU1553
Price ₦3,000 ($9)
No of Pages 57 Pages
Format Microsoft Word

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1553
    Price ₦3,000 ($9)
    No of Pages 57 Pages
    Format Microsoft Word

    Related Works

    A CASE STUDY OF LEECON FINANCE AND INVESTMENT LTD ABSTRACT Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management... Continue Reading
    ABSTRACT Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance. Due to unauthorized access to data in database, repose disclosure or modification... Continue Reading
    DESIGN AND IMPLEMENTATION OF COMPUTERIZED INFORMATION MANAGEMENT SYSTEM IN SEISMIC DATA PROCESSING (A CASE STUDY OF INTEGRATED DATA SERVICES LIMITED, IDSL BENIN-CITY) ABSTRACT Oil industry is a prominent aspect of modern economy and as it were exploration activities are very important for continuity of oil production. The exploration activities... Continue Reading
    ABSTRACT Oil industry is a prominent aspect of modern economy and as it were exploration activities are very important for continuity of oil production. The exploration activities involve the acquisition of data and processing. As exploration activities increases in the modern world, the computer manufacturers are also working hard to produce... Continue Reading
    ABSTRACT A Budget being the planning of how to spend revenues and incoming capitals so this makes is necessary to make sure that it is done with extra care. Budgets and the methods of preparing a good one has been a problem to most organization both private and government, the implementation of a faulty budget has brought man companies to a close... Continue Reading
    ABSTRACT A Budget being the planning of how to spend revenues and incoming capitals so this makes is necessary to make sure that it is done with extra care. Budgets and the methods of preparing a good one has been a problem to most... Continue Reading
    DESIGN AND IMPLEMENTATION OF COMPUTERIZED BUDGET ANALYSIS SYSTEM (CASE STUDY OF ENUGU STATE MINISTRY OF FINANCE) ABSTRACT A Budget being the planning of how to spend revenues and incoming capitals so this makes is necessary to make sure that it is done with extra care. Budgets and the methods of preparing a good one has been a problem to most... Continue Reading
    ABSTRACT A Budget being the planning of how to spend revenues and incoming capitals so this makes is necessary to make sure that it is done with extra care. Budgets and the methods of preparing a good one has been a problem to most organization both private and government, the implementation of a faulty budget has brought man companies to a close... Continue Reading
    ABSTRACT Federal Ministry of Finance has always monitoring how economic growth is moving in this Nation.  After the granting of internal autonomy to regions in 1946, there have been subsequent fiscal commission, military decrees Actes of Parliaments that reviewed both dreamed earning structure for Government.  In the cause of this research... Continue Reading
    ABSTRACT Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system. Before the advent of computers, there was no security of vital information’s, files where pulled out from cabinets from sections, which might result to... Continue Reading