Professional Documents
Culture Documents
TABLE OF CONTENTS
Title Page
Declaration
Certification
Acknowledgment
Dedication
Table of Contents
Abstract
CHAPTER ONE
INTRODUCTION
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
CHAPTER THREE
METHODOLOGY
ii
3.1 Introduction
CHAPTER FOUR
4.1 Introduction
iii
4.7 System User Guide
4.8 Results/Finding
4.10 Discussion
CHAPTER FIVE
5.1 Introduction
5.2 Summary
5.3 Conclusion
5.4 Recommendation
REFERENCE
LIST OF FIGURES/TABLES
iv
Figure 2.1 Encrypting and decrypting with a key
v
For more project topics and materials visit: https://www.classgist.com
Enquiries: https://www.classgist.com/contactus.aspx
CHAPTER ONE
INTRODUCTION
Digital security today has taken a new dimension, a new style and a strategic
approach which tends to secure data travelling across the globe through a public
vehicle called the internet. Data cannot be over-secured with the available
threats that can turn to reality, small or large, minor or important; there is a need
to build a secure wall around them (AnandaMitra 2010). The traditional method
most computer users use in securing data is to lock them with applications, use
passwords from programs like Microsoft Word, Excel and PowerPoint. This
method is same as no protection especially when data contain useful details that
need to be enclosed by two parties such as pay slips, financial records, military
Data encryption is a useful form of doing this; it employs technique that locks
out information from any unauthorized user. Nowadays, data can be hijacked
and cracked with intense logic, exposure to facts and experience inM.I.S-
even more to ensure that sensitive data is protected through its life-cycle. This
will create a sense of security and assurance that the transited information is
locked-out to only authorized personnel. However, the fact remains that any
6
For more project topics and materials visit: https://www.classgist.com
Enquiries: https://www.classgist.com/contactus.aspx
how secure, it may only take some time. This process may be attempted for so
Hacking has gained its ground in countries where MIS has stood very firm like
USA, England, Canada, India etc., most of our security systems are built by
which may not be protected or lightly protected. Data’s sent over the internet
are open to hijackers who can sniff them from the network, our mailboxes,
Encryption has long been used by military and governments to facilitate secret
many kinds of civilian systems. For example, the Computer Security Institute
reported that in 2007, 71% of companies surveyed utilized encryption for some
of their data in transit, and 53% utilized encryption for some of their data in
storage. Encryption can be used to protect data "at rest", such as information
stored on computers and storage devices (e.g. USB flash drives). In recent years
drives. Encrypting such data at rest helps protect them should physical security
7
For more project topics and materials visit: https://www.classgist.com
Enquiries: https://www.classgist.com/contactus.aspx
Encryption is also used to protect data in transit, for example data being
automatic teller machines. There have been numerous reports of data in transit
This study aims to create a new protocol for data’s security which will be based
Due to the numerous damages that can be done to a computer connected to the
internet, one of which is to implant spywares and viruses to monitor and send
includes
8
For more project topics and materials visit: https://www.classgist.com
Enquiries: https://www.classgist.com/contactus.aspx
iv. Existing security systems fail to create a single link between data
Weak security and encryption standards are found in data created by most
applications such as Microsoft Word, Excel, database data and special purpose
reports.
Can provisions of link between the data transfer by the two parties bridge
9
For more project topics and materials visit: https://www.classgist.com
Enquiries: https://www.classgist.com/contactus.aspx
ignored in any form; any small hole identified in any system can become a large
road for illegal and traceless movements which can do damages to our data.
ii. It gives a clear knowledge of how sensitive and important data can be
protected
This study uses a deep programming approach to bring life to the basics of this
work
Encryption Standard to build a security protocol for data which are highly
ii. To build a system based on AES and user key of choice to give a very
iii. To develop a simple but well-structured system which can handle data
10
For more project topics and materials visit: https://www.classgist.com
Enquiries: https://www.classgist.com/contactus.aspx
iv. To provide a new technique that will enhance the integrity of data which
This research scope covers the message security, message integrity, user’s
These data can be of any format and any size which will be processed at a very
high rate. The software is meant to work in accordance to the aims and
hackers to fully try their best on the output of the project.Searching information
about computer security through Data Encryption and another problem since the
secrete key has to be sent to the receiver of the encrypted data, it is hard to
11
For more project topics and materials visit: https://www.classgist.com
Enquiries: https://www.classgist.com/contactus.aspx
something. Is the action that must follow any preliminary thinking in order for
SECURITY; the set of access control and permission that are used to determine
password can read it. Encryption data is commonly referred to as cipher text
text.
other data and converting it back into text that you or the computer can read
and understand.
that the integrity and privacy of any data sent across a network has not been
compromised.
12