You are on page 1of 5

TITLE: CYBER CAFE MANAGEMENT

SYSTEM

Name: ARYAN V KULSHRESHTHA (18BCI0235)


SHASHANK TYAGI (18BCI0231)
NIHAAR CHHABA (18BCI0229)

Course Code: CSE3001

Course Name: SOFTWARE ENGINEERING

Slot: F1

Prof.: SWETA BHATTACHARYA


Problem Definition
The project entitled “Cyber Cafe Management System” is a software package,
which can be used in cyber cafes for managing the clients’ computer efficiently.
Now a day’s cyber terrorism, which is mainly undergone through internet cafés,
need to be tackled properly. Thereby, it is indeed necessary to store the valid
information of the user who comes for internet access. The system being used, the
time at which the user logs in and logs out should be recorded systematically. In
this modern era, a number of people access the internet frequently by means of
cyber cafes. For such frequent users, a prepaid account shall be maintained and
discounted rates may be charged from them. While walkthrough users, who are
less frequent, are charged a fixed rate.
Motivation
To make a properly functional Cyber Cafe Management system. All cyber cafes
have some basic needs likeable to control the systems that are being rented to the
customers and are charged on timely basis. Now days it may also require to save
some details of the customers for security reasons. When a customer enters a
cybercafe he has to be allotted a PC and the start time is noted. At any time, the
cyber administrator should be able to see the status of any PC, When the customer
wants to do some other activities like taking a print out or scan a copy etc. It
should be recorded. And finally, all the details will be available to the Cyber
administrator. There should be displays of all the transactions taking place in the
café.
Project Scope
This project is intended to be used in Cyber Cafe. All cyber cafes have some basic
needs likeable to control the systems that are being rented to the customers and are
charged on timely basis. This project only have server part which runs on Admin
system. The Admin should have control over the usage of the client system.

Product scope
CCMS has many powerful features and is certainly more than a "simple"
diagramming tool. Due to the inevitable requirement, computerization of each and
every sector in the main stream is must, so that it can be held itself in the race. Few
eye-catching features of our project are its simplicity, accuracy, and its user-
friendly interface. Our software incorporates all the features and facilities provided
by the Visual Studio software. This project has been developed to manage the
entire working of the Cyber Café. The customer is serviced at his footsteps
wherein he just types in the request and he is just a click away.

Stakeholders
• Government
Governments assume a significant job and are in a situation to lead national
digital security endeavors that include partners. The legislature has
meaningful measure to counter digital security dangers.
• Policy making
• Legal Measures
• Government cyber security authorities and Cyber Cafe association or
owner’s coordination
• Incident management and cyber security readiness assessment
• Building cyber security awareness
• Development of cyber security framework for Cyber Cafe with public

• Cyber Cafe Owners/Owners


The Owners assumes a significant job for usage of cyber security in Cyber
Cafe. The proprietors observe the principles and guidelines for cyber
security as set forth by the administration. Proprietors need to keep
themselves refreshed with most recent cyber security patterns or cautions.
They ought to have information to make important move in the event that a
cyber-assault is in progress or Cyber-wrongdoing has occurred. The
proprietors ought to help out the administration cyber security staff and work
as a team with them to execute cyber security. Cyber Cafe proprietors ought
to ensure the guest's security by taking careful steps, for example,
introducing dependable antivirus programming, antispyware programming
observing standards and guidelines, showing sheets of rules of Cyber Cafe
and so on.
• Visitors
Guests visiting the Cyber Cafe ought to observe rules and guidelines of the
Cyber Cafe. They ought to know about cyber security and Cyber-
wrongdoing. Vital safeguards, for example, checking refreshed antivirus,
various passwords for various sites, keeping individual and authority
accounts extraordinary, utilizing private program, making important security
settings, for example, switch off the auto spare part for secret phrase and
username, crippling the document sharing choice ,being mindful in cafe that
no one watches your activities, not leaving the computer unattended and so
on. Guests ought to ensure their protection first by 108 making fundamental
cyber security strides. On the off chance that they become casualty of Cyber-
wrongdoing they should realize where to report and what further advances,
they should take to maintain a strategic distance from further issues.
• ISP
Network access supplier assumes a significant job in sending the outsider
substance on web. These are the stakeholders who are capable to take care
about the substance on the web and forestall any unlawful substance,
according to Ministry of correspondence and Information Technology
Department of Electronics and Information Technology. ISP ought to help
out government to give subtleties required by the legislature in the event that
a Cyber-crime happen.
Budget
Task Expenses (Rs.)
Employee’s salary 85,000
Hardware 2,00,000
Software 90,000
Licensing 50,000
Maintenance 1,00,000
Total budget is around 5 to 6 Lakhs

You might also like