You are on page 1of 5

ABSTRACT

The Software security system is totally enhanced with the Features that enable us to feel the real time environment. Todays world is mostly employing the latest networking techniques instead of using stand alone pcs .Due to globalization the information is shared through sending memos, E-mails and Fax .It is not secure and reliable . There is threat of security by the eavesdroppers, hackers and other unauthorized users. Hence, it is necessary to develop an application for providing security to the developed system. This project Software Security System simulates the above application.

Software security is to secure from the unauthorized user to gain access over the information. The main aim of security system is secured the networking concepts and the information cant converted by the other user. To read the information one must decrypt the encrypted information in a specified manner. The sender and receiver both can have the systematic way of access to the information. The security system must start with physical security. This is physically inaccessible to unauthorized intruders. Security system

involves protecting the computer installation against natured disarters such as fires or earthquakes. Security systems have methods of verifying accesses. One method is to store a list of acceptable telephone numbers in the computer and have the computer callbacks when a user calls in another method. Todays software are being pirated from the original one.This must be prevented which is also one of the main intention of the project Otherwise some other pirate the important software developed by you. A unique identification number namely the MAC Address is used to protect the software from piracy. This project provides security using the concept of cryptography. The security may be any of the two types ,that is, symmetric or asymmetric. The procedure containing of encode the data using some algorithms which consist of a key (public/private) through which the other side i.e, other party will decode using the same key which has been accepted . By both parties or users.

CONCEPT OF PROJECT WORK

Before starting every project its planning is done. Planning a project is a very important task and should be taken up with great care as the efficiency of whole project largely depends upon its planning.

While planning a project, each and every detail should be worked out in anticipation and should be considered carefully considering all the relevant provisions in advance. Nowadays, more stress is being given to bring the engineers forward to open their own companies, and Engineering students after completing their courses are also being encouraged to open their own companies. During the project work, students get experience of future of the external environment in which their work becomes valuable service to the companies. Hence, the study of project planning has become more important. For this reason most of the universities and Boards have introduced the project work in the syllabus of final year of Engineering and Diploma courses.

This chapter will help in planning the project for the students as well as to the engineering who want to start new companies and will facilitate in formulating the correct approach to take up the job of project planning. Broadly speaking, project analysis is the commercial research done to find the suitability of business or a company to be started. Planners go into different investigations for effecting the business or company to obtain good working conditions, better quality of product and quite handsome profits.

INTRODUCTION
The project SOFTWARE SECURITY SYSTEMS is totally enhanced with the features that enable us to feel the real-time environment. As the todays world is mostly employing the latest networking techniques instead of using stand-alone PCs. As every product possessing advantages might also have some disadvantages. The advantages with the networking are that a company can share files or data without need to use some external devices to carry the data. Similarly, a company can share the single costly printer. Likely, the disadvantages are also numerous. Somebody writes a program and can make the costly printer to misprint the data. Similarly, some unauthorized user may get access over the network and may perform any illegal functions like deleting some of the sensitive information like employee salary details, while they are in transaction. Our project has some of the features described as follows:

Firstly, the project makes use of the secured networking concepts that will make the sensitive information to be encrypted (converted) in such a manner that will not be understood by the unauthorized user who gains access over this information. To read the information one must decrypt the encrypted information in a pre-specified manner. Only sender and receiver both can have the systematic way of access to the information. Secondly, many of the todays software are being pirated from the original one. This must be prevented which is also the one of the main intention of the project. Otherwise some other might pirate the important software developed by you. A unique identification number namely the MAC Address is used to protect the software from piracy.

EXISTING SYSTEM:

In the physical system the network helps a particular organization to share the data by using external devices. The external devices are used to carry data. The existing system cannot provide security, which allows an unauthorized user to access the secret files. It also cannot share a single costly printer. Many interrupts may occur with in the system.

2.2 PROPOSED SYSTEM:

In this system security is the term that comes into picture when some important or sensitive information must be protected from an unauthorized access. Hence there must be some way to protect the data from them and even if he hacks the information, he should not be able to understand whats the actual information in the file, which is the main intention of the project.

MODULES:

The project is designed to protect the sensitive information while it is in transaction in the network. There are many chances that an unauthorized person can have an access over the network in some way and can access this sensitive information. The project uses the strong secured algorithms that enables and guarantees the security of the information in the network.

The project is divided in to two modules. Each module is embedded with the powerful algorithms that are used especially to secure the sensitive information. 1. RSA algorithm. 2. DES algorithm.

SYSTEM REQUIREMENTS

Our project SOFTWARE SECURITY SYSTEMS needs the following minimum requirements of system.

SOFTWARE REQUIREMENTS PROGRAMMING LANG :JAVA

OPERATING SYSTEM

:WINDOWS

FRAME WORK

:SWINGS

DOCUMENTATION

:OFFICE 2000

HARDWARE REQUIREMENTS PROCESSER HARD DISK RAM MONITOR KEYBOARD MOUSE :80486 :1.2 GB :16 MB :VGA :101 STANDARD KEY :LOGITECH

You might also like