Full Project – Design and implementation of security management using data encryption and decryption technique

Full Project – Design and implementation of security management using data encryption and decryption technique

Click here to Get this Complete Project Chapter 1-5

CHAPTER ONE
INTRODUCTION

1.1     Background of the Study

Digital security today has taken a new dimension, a new style and a strategic approach which tends to secure data travelling across the globe through a public vehicle called the internet. Data cannot be over-secured with the available threats that can turn to reality, small or large, minor or important; there is a need to build a secure wall around them (AnandaMitra 2010). The traditional method most computer users use in securing data is to lock them with applications, use passwords from programs like Microsoft Word, Excel and PowerPoint. This method is same as no protection especially when data contain useful details that need to be enclosed by two parties such as pay slips, financial records, military data’s and more.

Data encryption is a useful form of doing this; it employs technique that locks out information from any unauthorized user. Nowadays, data can be hijacked and cracked with intense logic, exposure to facts and experience inM.I.S- management information security as well. With this in view, there is need to do even more to ensure that sensitive data is protected through its life-cycle. This will create a sense of security and assurance that the transited information is locked-out to only authorized personnel. However, the fact remains that any data that is exposed to a third-party stand a chance to be compromised no matter how secure, it may only take some time. This process may be attempted for so many reasons best known to the person.

Hacking has gained its ground in countries where MIS has stood very firm like USA, England, Canada, India etc., most of our security systems are built by these same professional hackers. Cyber-attack is also a way to gain access to personal, business or government systems and compromise sensitive data’s which may not be protected or lightly protected. Data’s sent over the internet are open to hijackers who can sniff them from the network, our mailboxes, secured cloud storage systems etc. at little or no cost.

Encryption has long been used by military and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage. Encryption can be used to protect data “at rest”, such as information stored on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers’ personal records being exposed through loss or theft of laptops or backup drives. Encrypting such data at rest helps protect them should physical security measures fail. Digital rights management systems, which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection), is another somewhat different example of using encryption on data at rest.

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Data should also be encrypted when transmitted across networks in order to protect against eavesdropping of network traffic by unauthorized users.

This study aims to create a new protocol for data’s security which will be based on the Advanced Encryption Standard (AES) which is a specification for the encryption of electronic data established by the US National Institute of Standards and Technology (NIST).

1.2     Statement of the Problems

Due to the numerous damages that can be done to a computer connected to the internet, one of which is to implant spywares and viruses to monitor and send user data to a hacker, computer users like MIS-management information system faces lots of problems in handling these challenges which can be disastrous to corporate firms, governments arms and other parastatals. These problems includes

  1. Unauthorized access to personal computer and data
  2. Lack of security enforcement on sensitive data
  • Usage of non-trusted software to secure valuable data
  1. Existing security systems fail to create a single link between data transferred by two parties
  2. Easy breakage into data which tends to be secured

Weak security and encryption standards are found in data created by most applications such as Microsoft Word, Excel, database data and special purpose reports.

1.3 Research question

Below are some of the questions encountered during the research:

  • Can designing and implementation of Advanced Encryption Standard be a solution to unauthorized access to personal computer and data?
  • May the supply of security majors help in solving lack of security enforcement on sensitive data?
  • When AES (Advance Encryption Standard) and Data Encryption Standard where used in designing cryptography can the result be solution to non-trusted software to secure the valuable data?
  • Can provisions of link between the data transfer by the two parties bridge the gap between the parties?
  • Can Design and implementation of this software using cryptography secure the data which is easily broken before?

1.4     Significance of the Study

Security is a part of MIS (Management information Security) that cannot be ignored in any form; any small hole identified in any system can become a large road for illegal and traceless movements which can do damages to our data. This study is therefore important since

  1. It creates a secure environment for exchanging data
  2. It gives a clear knowledge of how sensitive and important data can be protected

This study uses a deep programming approach to bring life to the basics of this work

1.5     Aim and Objectives of the Study

This study is a developmental research which employs the Advanced Encryption Standard to build a security protocol for data which are highly sensitive to the owner a case study of MIS- informationsystem AbduGusaupolytechnic. It combines an already existing security format with a new approach to aid data security in the 21st century.  it aims

  1. To develop a security protocol for sensitive and valuable data
  2. To build a system based on AES and user key of choice to give a very high level of security
  • To develop a simple but well-structured system which can handle data encryption and decryption
  1. To provide a new technique that will enhance the integrity of data which are transferred over the internet or any other form
  2. To expose the importance of using AES in data security

1.6 Scope and Limitation of the Study

This research scope covers the message security, message integrity, user’s authentication and key management of message.

These data can be of any format and any size which will be processed at a very high rate. The software is meant to work in accordance to the aims and objectives stated above to tackle the stated problems.  Also it is built as a desktop application which will run only on windows machine.

Some constraint identified in this research is the amount of time available to build the software, availability of experienced MIS security personnel’s or hackers to fully try their best on the output of the project.Searching information about computer security through Data Encryption and another problem since the secrete key has to be sent to the receiver of the encrypted data, it is hard to securely pass the key over the network to the receiver.

1.7     Definitionof SomeTerms

  • IMPLEMENTATION; is the carrying out, execution, or practice of a plan, a method, or any design, idea, model, specification, standard or policy of doing something. Is the action that must follow any preliminary thinking in order for something to actually happen.
  • SECURITY; the set of access control and permission that are used to determine if a server can grant a request for a service or resource from a client.
  • PASSWORD; an identity that defines authorized users of a computer in order to gain access to the system.
  • SOFTWARE; A collection of computer programs that runs as a group to accomplish as set of objectives which could be referred to as job.
  • ENCRYPTION; The process of converting ordinary information (plain text) into unintelligible gibberish (that is cipher text).
  • DATA ENCRYPTION;translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encryption data is commonly referred to as cipher text
  • DECRYPTION; The reverse, moving from unintelligible cipher text to plain text.
  • DATA DECRYPTION; is the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand.
  • CRYPTOGRAPHY;this is used to hide data from public view and to ensure that the integrity and privacy of any data sent across a network has not been compromised.

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.

Click here to Get this Complete Project Chapter 1-5

 

 

 

 

 

You can also check other Research Project here:

  1. Accounting Research Project
  2. Adult Education
  3. Agricultural Science
  4. Banking & Finance
  5. Biblical Theology & CRS
  6. Biblical Theology and CRS
  7. Biology Education
  8. Business Administration
  9. Computer Engineering Project
  10. Computer Science 2
  11. Criminology Research Project
  12. Early Childhood Education
  13. Economic Education
  14. Education Research Project
  15. Educational Administration and Planning Research Project
  16. English
  17. English Education
  18. Entrepreneurship
  19. Environmental Sciences Research Project
  20. Guidance and Counselling Research Project
  21. History Education
  22. Human Kinetics and Health Education
  23. Management
  24. Maritime and Transportation
  25. Marketing
  26. Marketing Research Project 2
  27. Mass Communication
  28. Mathematics Education
  29. Medical Biochemistry Project
  30. Organizational Behaviour

32    Other Projects pdf doc

  1. Political Science
  2. Psychology
  3. Public Administration
  4. Public Health Research Project
  5. More Research Project
  6. Transportation Management
  7. Nursing

Education

Essay 

 

 

Full Project – Design and implementation of security management using data encryption and decryption technique