THE DESIGN, IMPLEMENTATION, AND TESTING OF SECURITY SYSTEM

0
896

THE DESIGN, IMPLEMENTATION, AND TESTING OF SECURITY SYSTEM

 

ABSTRACT

One of the foremost small business security concerns is the protection of critical information, both within their internal financial infrastructures and from external elements, Studies show that most cyber-attacks occur inside organizations, instigated by personnel with valid access to the system. This paper describes the design, implementation, and testing of security system that enhances the capability of small businesses to protect information within the boundary of their networks. Within a specified network, database and transactions are encrypted, decrypted, and processed by the Internal Control and Employee Agents. The database was clustered and access method was provided to employees using private keys. The test results indicate that this additional security layer provides a simple solution to the data sharing and transition within an organization’s network. The results of this study will be of significance to owners, managers, and the security personnel responsible for small business networks.

ORGANIZATION OF WORK

This research work is basically divided into seven chapters

Chapter one deals with Introduction, Statement of Problem, Aims and Objectives, Purpose of Study, Significance of Study, Scope of Study, Limitation of Study, Assumption of Study and Definition Terms.

Chapter two is Review of relevant literature.

Chapter three consists of Description and Analysis of the Existing system, Fact finding method, Organizational Structure, Objectives of Existing System, Input, Process and Output Analysis, Information flow diagram, Problem of Existing System and Justification of the new System.

Chapter four comprises of Design of the new System, Design Standard, Output  and Input Specification and Design, File Design, Procedure Chart, System Flowchart, System Requirements, Hardware, Software, Operational and Personnel Requirements.

Chapter Five preceeded by Implementation and followed by Design Standard, Program Design, Program Flowchart, Pseudocode, Coding, Test Data/Test Run, User Training and Cutover Process.

Chapter Six consists of Program and User Documentation.

Chapter Seven Comprises of Recommendation, Summary and Conclusion.

References, Appendix, Source Listing.

 

DOWNLOAD COMPLETE PROJECT MATERIAL

THE DESIGN, IMPLEMENTATION, AND TESTING OF SECURITY SYSTEM

Leave a Reply