You are on page 1of 4

CONTENTS

TITLE PG.NO
CHAPTER-1 INTRODUCTION 1-5
1.1 WHAT IS SECURE COMPUTING 1
1.2 WORKING CONDITIONS AND BASIC NEEDS IN THE SECURE COMPUTING 2-3
1.2.1 BENEFITS OF SECURE COMPUTING 4-5
CHAPTER-2 LITERATURE SURVEY 6-14
2.1ON PREDICTIVE MODELS AND USER DRAWN GRAPHICAL PASSWORDS 6
2.2 MODELING USER CHOICE IN THE PASSPOINTS GRAPHICAL 7
2.3 SECURING PASSWORDS AGAINST DICTIONARY ATTACKS 8
2.4 REVISITING DEFENSES AGAINST LARGE-SCALE ONLINE PASSWORD 9
2.5 COGNITIVE AUTHENTICATION SCHEMES SAFE AGAINST SPYWARE 10
2.6 SYSTEM STUDY 11
2.6.1 FEASIBILITY STUDY 11
2.6.2 ECONOMICAL FEASIBILITY 11
2.6.3 TECHNICAL FEASIBILITY 11
2.6.4 SOCIAL FEASIBILITY 12
2.7 SYSTEM DESIGN AND DEVELOPMENT 12
2.7.1 INPUT DESIGN 12
2.7.2 OUTPUT DESIGN 13-14
CHAPTER-3 PROJECT ANALYSIS 15-16
3.1 EXISTING SYSTEM 15
3.2 DISADVANTAGES OF EXISTING SYSTEM 15
3.2.1 PROPOSED SYSTEM 15
3.3 ADVANTAGES OF PROPOSED SYSTEM 15
3.4 SYSTEM REQUIREMENTS 16
3.4.1 HARDWARE REQUIREMENTS 16
3.4.2 SOFTWARE REQUIREMENTS 16
TITLE PG.NO
CHAPTER-4 PROJECT DESIGN 17-25
4.1 SYSTEM ARCHITECTURE 17
4.1.1 DATA FLOW DIAGRAM 18-19
4.1.2 UML DIAGRAMS 20
4.1.3 USE CASE DIAGRAM 21-22
4.1.4 CLASS DIAGRAM 23
4.1.5 SEQUENCE DIAGRAM 24
4.1.6 ACTIVITY DIAGRAM 25
CHAPTER-5 IMPLEMENTATION 26-31
5.1 MODULES 26
5.1.1 GRAPHICAL PASSWORD 26
5.1.2 CAPTCHA IN AUTHENTICATION 26
5.1.3 OVERCOMING THWART GUESSING ATTACKS 26
5.1.4 SECURITY OF UNDERLYING CAPTCHA 27
5.2 SOFTWARE ENVIRONMENT 28
5.2.1 JAVA TECHNOLOGY 28
5.2.2 THE JAVA PLATFORM 29
5.2.3 WHAT CAN JAVA TECHNOLOGY DO 30-31
CHAPTER-6 OUTPUT RESULTS 32-50
6.1 SOURCE CODE 32-36
6.2 SCREEN SHOTS 37-50
CHAPTER-7 SYSTEM TESTING 51-54
7.1 TYPES OF TESTS 51
7.1.1 UNIT TESTING 51
7.1.2 INTEGRATION TESTING 51
7.1.3 FUNCTIONAL TEST 52
TITLE PG.NO
7.1.4 SYSTEM TEST 52
7.1.5 WHITE BOX TESTING 52
7.1.6 BLACK BOX TESTING 53
7.1.7 UNIT TESTING 53
7.1.8 TEST STRATEGY AND APPROACH 53
7.1.9 INTEGRATION TESTING 54
7.1.10 ACCEPTANCE TESTING 54
CHAPTER-8 CONCLUSION 55-56
REFERENCES 57
LIST OF FIGURES

FIG NUMBERS DESCRIPITION PG.NO


FIG 1.1 SECURE COMPUTING 1
FIG 4.1 SYSTEM ARCHITECTURE 17
FIG 4.1.1 DATA FLOW DIAGRAM 19
FIG 4.1.2 UML DIAGRAMS 20
FIG 4.1.3 USE CASE DIAGRAM 22
FIG 4.1.4 CLASS DIAGRAM 23
FIG 4.1.5 SEQUENCE DIAGRAM 24
FIG 4.1.6 ACTIVITY DIAGRAM 25
FIG 5.2.1 JAVA TECHNOLOGY 29
FIG 5.2.2 THE JAVA PLATFORM 30

You might also like