091-2230-8145     |      dataprojectng@gmail.com

DESIGN AND IMPLEMENTATION COMPUTERIZED DATA ENCRYPTION SYSTEM

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 3000

BACKGROUND OF THE STUDY

The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is a valuable and costly asset that must be presented, controlled and planned just like other valuable assets within an organization. This work is designed to provide a security mechanism using a computerized data encryption system, readable data is altered into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concept to create coded message that is virtually impossible to break. It is easy to encrypt a message on a simple personal computer so that the biggest computer in the world could not decipher without spending for more time on the problem that exists in the life span of the entire universe.

There are two basic forms of encryption; private key encryption and public key encryption, the same secret key is used by the sender and receiver to encrypt and decrypt message. Public key encryption also known as asymmetric key encryption uses two different keys at once, a combination of a private key and public key, the private key is known only to your personal computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.

​​​​​​​STATEMENT OF THE PROBLEM

Security is currently a widespread and growing concern that affects all areas of the society, in the same manner data and information security has become one of the most pressing challenges confronting all kinds of present day organizations owing to their rapid adoption of information technology (IT) in the entirety of their activities. This development has made data and information to a larger extend vulnerable to unauthorized users, spammers, crawlers and hackers who break into people’s and organization’s privacy. This has no doubt posed greater challenges on people who use database, share files and other resources on computer networks.

    1. AIMS AND OBJECTIVES

The aims and objectives of this work are as follows:

  • Reduce stress, time consumption and cost of operation involved in a manual security system.
  • Develop a software system that will restrict unauthorized access to data files on systems.
  • Suggest security techniques which can create conducive working atmosphere for organizations that are having their data threatened.
  • Enhance key sharing mechanism that allows users to share and have access to files security.



FIND OTHER RELATED TOPICS


Related Project Materials

MASS MEDIA AND ITS ROLE IN INFLUENCING THE RATE OF CRIME AMONG YOUTHS IN THE SOCIETY

Background Of The Study   

There is no doubt that the impact of the media on young people’s lives...

Read more
DESIGN AND FABRICATION OF BASIC STATIC AND DYNAMIC BALANCING MACHINE

ABSTRACT

 

This work is an attempt to evolve a means for statically and dynamical balancing of mechanical...

Read more
AN ANALYSIS OF THE LEGAL RIGHTS OF THE NIGER DELTA STATES IN RELATION TO OWNERSHIP AND CONTROL OF MINERAL RESOURCES UNDER NIGERIAN LAW

ABSTRACT

Natural resources worldwide are a gift of nature and an endowment of comfort that makes the existence of mankind complete. As na...

Read more
EVALUATION OF DESIGN, CONSTRUCTION AND PERFORMANCE OF A PASSIVE SOLAR WATER HEATER

Background of the Study

Energy is seen as a primary source of income creation and an important role in economic growt...

Read more
KNOWLEDGE AND PERCEPTION OF NOSOCOMIAL INFECTION AMONG HEALTH WORKERS AND RESIDENT OF EGOR L.G.A IN EDO STATE, NIGERIA

ABSTRACT

Hospital acquired infections (HAIs) continue to be a threat to hospital admissions and workers thus contri...

Read more
THE IMPACT OF PUBLIC LIBRARY SERVICES

ABSTRACT

This research work covers the impact of the public library services to the people of Kaduna St...

Read more
SELF-CONCEPT AND MOTIVATION AS CORRELATES OF STUDENT'S ACADEMIC PERFORMANCE IN MATHEMATICS IN MKPAT ENIN LOCAL GOVERNMENT AREA

Background of the Study

In modern Nigeria, a larger focus is being placed on industrial and technologic...

Read more
EFFECT OF DRUG ABUSE ON REPRODUCTIVE HEALTH (A CASE STUDY OF SOUTHERN IJAW L.G.A , BAYELSA STATE).

ABSTRACT

Alcohol and substance abuse is among the most commonly reported adverse psychological problems for young women...

Read more
CONSUMERS’ PERCEPTION OF TRUTH IN ADVERTISING

ABSTRACT

This research study surveys how certain advertising strategies affect consumers’ perception of truth in them with outcomes...

Read more
HAZARDOUS CHEMICAL SOURCES AND EFFECT ON THE ENVIRONMENT

ABSTRACT

This study was carried out on hazardous chemical sources and effect on the environment using S...

Read more
Share this page with your friends




whatsapp