Home » Project Material » Design and development of internet security package

Design and development of internet security package

(A CaseStudy Of Access Point CommunicationLimited Umuahia)

5 Chapters
|
61 Pages
|
7,066 Words
|

An internet security package encompasses a comprehensive suite of software tools and protocols designed to safeguard users’ digital devices, data, and online activities against various cyber threats, including viruses, malware, phishing attempts, and unauthorized access. This integrated solution typically includes antivirus and anti-malware programs, firewalls, email and web filtering systems, encryption tools, and secure browsing features, among others, offering robust protection across diverse online environments. Implementing an effective internet security package is crucial for individuals and organizations alike to mitigate cybersecurity risks and ensure data integrity, confidentiality, and availability, thereby fostering a secure and trustworthy online experience while optimizing resilience against evolving cyber threats.

ABSTRACT

his project study is focused on the design and development of security package for the Access Point Communication Limited.
This research work came to existence the time when internet café business is becoming very popular and vast. The principal objective of this project is to stop or deny access to an unauthorized user and also to ensure proper accountability of cash received by the ticketers. Therefore the design and development of this internet security package for Access Point Limited is worth while.
This project covers all the general procedure involved in the design and development of a reliable in-house software application package that will provide automated Customer services for a cyber café. These procedures include the initial
Design, coding, testing, implementation, maintenance and enhancement of the new system. Thus this software will provide an accurate timing and billing information at any point in time for a cyber café operation.

 

TABLE OF CONTENT

Title page
Certification
Dedication
Acknowledgement
Abstract
Table of contents

CHAPTER ONE
1.1 Background of the study 1
1.2 Statement of Problem 2
1.3 Objective of the Project 3
1.4 Significance of the project 4
1.5 Scope of study 4
1.6 Limitations 5
1.7 Definition of term 5

CHAPTER TWO
2.0 Literature review
2.1 What is internet? 8
2.3 Services provided by Internet 9
2.4 Internet Security 11
2.4.1 Internet Security problems 12
2.4.2 Problems of Internet Security problem 12
2.5 Efforts to solve Security Problems. 14

CHAPTER THREE
3.0 Analysis of the Existing System 19
3.1 Introduction 19
3.2 Research Methodology 19
3.3 Detailed Analysis of the Existing System 20
3.3.1 Organizational / Companies Profile 20
3.3.2 The Organizational Structure of Different
Section 25
3.3.3 Data Flow Diagram of the Existing System 26
3.4 Weakness of the Existing System – 29
3.4.1 Analysis and Design of the New System 31
3.4.2 Objective of the New System 31
3.4.3 Program Design 32
3.4.4 Process Description of the New System 33
3.5 Control System Menu 34
3.6 File Attribute (Data Base Specification) 34
3.7 Administration Log in Data Base 35
3.8 Customers Log in Module Input and Screen Output 35
3.9 Add New Member Module Input and Screen
Output 36
3.10 Admin Change Password Module Screen
Output 37
3.11 Daily Report Input and Screen Output 37
3.12 Exit Program Module Input and Output Screen 38
3.13 Program Coding Platform 38
3.14 Choice of Programming Language 39
3.15 Output Design 40

CHAPTER FOUR
4.0 System Implementation and Documentation 41
4.1 System Implementation 41
4.2 System Requirement 42
4.3 Hardware Requirement 42
4.4 Software Requirement 43
4.5 System Test-Run 43
4.6 System Changeover 44
4.8 Running the Program 45
4.9 System Maintenance 46

CHAPTER FIVE
5.0 Summary, Conclusion and Recommendation 47
5.1 Summary 47
5.2 conclusions 48
5.3 Recommendations 49
References 50
Appendices
Appendix A: Program Listing
Appendix B: Sample Output.
Appendix c: System Flowcharts

CHAPTER ONE

1.1 BACKGROUND OF THE STUDY
The Internet has been described as the most revoluntary communication development of last century. It has changed everything about every type of business and there seems no end in sight to the advantages this phenomenon can bring to this enhancement of business communications. The Internet is a system for providing communication links between computers via local companies referred to as Internet of computer networks that is changing the way organizations and individuals communicates and do business.
However, the major drawback is the security risks associated with it. The Internet suffers from a significant and widespread security problems. Perhaps, most important of all reason adduced for the poor security facilities on the internet may be the fact that was not designed to every secure: open access for the purpose of research was the prime motivation for the internet at the time of its conception. Other factors responsible for the security lapse of the internet which is based on the TCP/IP (Transmission Control Protocol/Internet Protocol) suite of protocol. A number of TCP/IP (Transmission Control Protocol/ Internet Protocol) suites of protocols. A number of TCP/IP services are not secured and compromised by knowledgeable hackers. A number of security problems can be remedied or reduced through the use of this software and control for host security.

1.2 STATEMENT OF PROBLEMS
Some of the problems with the internet security are as a result of inherent vulnerabilities in the services (and the protocols that the services implement), while others are as a result of host configuration and access controls that are poorly implemental or overly complex to administer. Additionally, the role and importance of system management is often short-changed in job description resulting in many administrators begin at best, part-time and poorly prepared.
Further more, the unavailability of experts who will carry the job for the people. Also the cost at which people or individuals will undergo before acquiring one will also arise to be a problem.

1.3 OBJECTIVES OF THE PROJECT
The objective of this research work is to develop a client billing software program with modification of existing software and eliminating the entire obstacle in previous version of the numerous existing clients billing software program. Apart from producing an enhancement,
It will also:
i. prepare daily account of all transaction with clients
ii. Produce analyzed report for decision making
iii. Provide security to enhance system lock when credit expires.
iv. Automatically generate numbers as ID’S and allocate time and payments by clients.
v. Enable the system within the network to identify user with particular name and password.

1.4 SIGNIFICANCE OF THE PROJECT
Like any other application development the significance of this project is to make internet café business much more profitable to the investors
An internet café without effective security will gradually die because of pester and cashier stall time spend by clients.
This software is intended to stop the death of internet café’s with attendant un employment in the space. This will be facilitated by the development of automated technique i.e. café billing to check time automatically.

1.5 SCOPE OF STUDY
This project work or study is aimed at designing and developing a time billing software for the Access Point Communication Limited.
Furthermore, it is also aimed at saving the management of the access point communication limited the trouble and difficulties in running an internet café manually.

1.6 LIMITATION
The main problem encountered or the constraints in the course of this research were with the initial difficulty in grasping the knowledge of the field, which was quite alien to the researcher. Though this was overcame within a short period of time.
Also, the obtaining of accurate and complete information from the case study (Access Point Communication Limited) was somewhat inhibited. The researcher had to do some independent investigations and internet browsing to ensure that relevant information was used.
Finally, the issue of time can not be forgotten. This was a very limited time to carry out the research or the project and also limited time to produce the project work.

1.7 DEFINITION OF TERMS
INTERNET: this is an act linking several computers in the world in a wide area network.
E-MAIL: the term electronic mail is used to describe various system of sending data or message electronically via the telephone. Network or other data network, through a central computer without the need to post letters

SECURITY: this is an act of safeguarding a file or a document in order to allow unauthorized access.

FLOWCHART: This is the diagrammatic representation of the program components using standard symbols.

HARDWARE: this is the physical part of a computer system.

SOFTWARE: This is the program that controls the computer operation.
DATABASE: A collection of interrelated data stored with controlled redundancy to serve one or more application.

MICRO SOFT VISUAL BASIC: This is software which allows you to develop your own software
WWW: – This stands for World Wide Web which consists of the different website which you can visit.

NEWS GROUP: These are meeting please for people discussing special topic

NETWORK SERVERS: These are devices used to manage how the various resources on the network are shared.

HACKING: A hacker is people who attempt to invade the privacy of a system. Hackers are normally skilled programmers.

METHODOLOGY: A methodology is a collection of procedure techniques, tools and documentation aids which will help the system developer in their effort to implement a new information system, Abdul j. I

ONLINE: This is the direct connection to the computers through the internet and under the influence of the computer C.P.U
OFFLINE: This is the process of the computer not connected to the internet.

Save/Share This On Social Media:
MORE DESCRIPTION:

Internet security package:

An internet security package, also known as internet security software or suite, is a comprehensive set of tools and applications designed to protect your computer and personal information while you’re connected to the internet. These packages typically include various features and components to safeguard your online activities from various threats such as viruses, malware, phishing attacks, and more. Here are some common components and features you can expect to find in a typical internet security package:

Antivirus Protection: This feature scans your computer for viruses, Trojans, worms, and other malicious software to prevent them from infecting your system.

Firewall: A firewall monitors incoming and outgoing network traffic and blocks unauthorized access attempts, ensuring that your computer remains secure from external threats.

Anti-Malware: This component detects and removes different types of malware, including spyware, adware, and ransomware.

Anti-Phishing: Protects you from phishing attacks by identifying and blocking fraudulent websites that attempt to steal your personal information.

Email Protection: Scans your email messages and attachments for malicious content and prevents you from opening harmful emails.

Web Protection: Blocks access to malicious websites and warns you about potentially harmful websites before you visit them.

Identity Theft Protection: Some security packages offer identity theft protection services that monitor your personal information online and alert you to potential threats.

Parental Control: Allows parents to monitor and control their children’s online activities, including website access and screen time.

Password Manager: Helps you manage and secure your passwords, making it easier to use strong, unique passwords for each of your online accounts.

Secure Browsing: Ensures your online activities, such as online banking and shopping, are conducted securely by encrypting your internet connection.

System Optimization: Some packages include tools to optimize your computer’s performance by cleaning up unnecessary files and managing startup programs.

Device Compatibility: Internet security packages are typically available for a range of devices, including Windows PCs, Macs, Android devices, and iOS devices.

Regular Updates: The software should receive frequent updates to stay up-to-date with the latest threats and vulnerabilities.

Popular internet security packages include Norton Internet Security, McAfee Total Protection, Bitdefender Internet Security, Kaspersky Internet Security, and many others. When choosing an internet security package, consider your specific needs, the devices you use, and your budget to select the one that best suits you. Additionally, always keep your security software up-to-date to ensure maximum protection against emerging threats.