DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS
Download Full Final Year Project Topic and Materials for FREE. This Project Material contains 52 pages and contains Chapters 1-5
Keywords: Project Topic, Final Year Project Topic, Download Free Project Topic Material, DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS Project Topic and Materials
DESIGN AND IMPLEMENTATION OF INFORMATION (ENCRYPTION AND DECRYPTION) FOR FIRMS AND INDIVIDUALS
CHAPTER ONE
INTRODUCTION
1.O BACKGROUND OF THE STUDY
The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is a valuable and costly asset that must be presented, controlled and planned just like other valuable assets within an organization. This work is designed to provide a security mechanism using a computerized data encryption system, readable data is altered into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concept to create coded message that is virtually impossible to break. It is easy to encrypt a message on a simple personal computer so that the biggest computer in the world could not decipher without spending for more time on the problem that exists in the life span of the entire universe.
There are two basic forms of encryption; private key encryption and public key encryption, the same secret key is used by the sender and receiver to encrypt and decrypt message. Public key encryption also known as asymmetric key encryption uses two different keys at once, a combination of a private key and public key, the private key is known only to your personal computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.
Security is currently a widespread and growing concern that affects all areas of the society, in the same manner data and information security has become one of the most pressing challenges confronting all kinds of present day organizations owing to their rapid adoption of information technology (IT) in the entirety of their activities. This development has made data and information to a larger extend vulnerable to unauthorized users, spammers, crawlers and hackers who break into people’s and organization’s privacy. This has no doubt posed greater challenges on people who use database, share files and other resources on computer networks.
The aims and objectives of this work are as follows:
This study serves as a contribution towards improving information, data and information security on computerized information systems especially for organizations where data is transferred from one point to another. It will contribute in solving the problems of insecurity on both network for individual computers on a network. It also enhances the ability to support customers by providing secured and accurate access to all information. In the same manner, it will benefit those who transact online.
This work is only concerned with security of information (encryption and decryption) for firms and individuals. It does not consider the firms policies and other issues.
With regards to existing system, it is important for organization to develop a new system. This system will be designed with security as its watchword. It will be able to check access to the system. It will provide improved system efficiency, the unintentional distortion of data will be avoided and fraudulent practices and defaulters will be checked.
CHAPTER ONE
INTRODUCTION
1.O BACKGROUND OF THE STUDY
The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or exposure. There are several reports of spammers, crawlers and hackers who break into people’s privacy to gain illegal access to their data. This has posed greater challenges on people who use database, transact online, and internet users. Information is a valuable and costly asset that must be presented, controlled and planned just like other valuable assets within an organization. This work is designed to provide a security mechanism using a computerized data encryption system, readable data is altered into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concept to create coded message that is virtually impossible to break. It is easy to encrypt a message on a simple personal computer so that the biggest computer in the world could not decipher without spending for more time on the problem that exists in the life span of the entire universe.
There are two basic forms of encryption; private key encryption and public key encryption, the same secret key is used by the sender and receiver to encrypt and decrypt message. Public key encryption also known as asymmetric key encryption uses two different keys at once, a combination of a private key and public key, the private key is known only to your personal computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key.
Security is currently a widespread and growing concern that affects all areas of the society, in the same manner data and information security has become one of the most pressing challenges confronting all kinds of present day organizations owing to their rapid adoption of information technology (IT) in the entirety of their activities. This development has made data and information to a larger extend vulnerable to unauthorized users, spammers, crawlers and hackers who break into people’s and organization’s privacy. This has no doubt posed greater challenges on people who use database, share files and other resources on computer networks.
The aims and objectives of this work are as follows:
This study serves as a contribution towards improving information, data and information security on computerized information systems especially for organizations where data is transferred from one point to another. It will contribute in solving the problems of insecurity on both network for individual computers on a network. It also enhances the ability to support customers by providing secured and accurate access to all information. In the same manner, it will benefit those who transact online.
This work is only concerned with security of information (encryption and decryption) for firms and individuals. It does not consider the firms policies and other issues.
With regards to existing system, it is important for organization to develop a new system. This system will be designed with security as its watchword. It will be able to check access to the system. It will provide improved system efficiency, the unintentional distortion of data will be avoided and fraudulent practices and defaulters will be checked.
Download Full Project
Download
Get the complete project document.
Source: https://www.iprojectmaster.com/computer-science/final-year-project-materials/design-and-implementation-of-information-encryption-and-decryption-for-firms-and-individuals
Related Project Topics
All Project Topics
📂 Browse by Department
- Brewing Science
- Entrepreneurship
- Economics
- Mechanical Engineering
- Building and Technology
- Physiology
- Zoology
- Philosophy
- Anatomy
- Criminology
- Soil Science
- Industrial Chemistry
- Micro Biology
- Tourism & Hospitality
- Medicine
- Mathematics Education
- Final Year Project Topic
- Business Administration
- Fishery & Aquaculture
- French
- African Languages
- Political Science
- Guidance and Counseling
- Islamic & Arabic Studies
- Sociology
- Adult Education
- Marine and Transport
- Computer Science
- Project Management
- Nursing
- Commerce
- Business Education
- Biblical and Theology
- Education
- Computer Science Education
- Human Resource Management
- Applied Science
- Industrial & Relations Personnel Management
- Health & Sex Education
- Architecture
- Information Technology
- Vocational Studies
- Fine & Applied Arts
- Chemistry
- Insurance
- Science Labouratory
- Public Health
- Veterinary
- Office Technology
- Actuarial Science
- Computer Engineering
- Law
- Pharmacy
- Public Administration
- Petroleum Engineering
- Psychology
- Agricultural Science
- Urban & Regional Planing
- Mass Communication
- History
- Marketing
- Environmental Science
- Biology
- Accounting Education
- Purchasing & Supply
- Accounting
- Quantity & Surveying
- Food Science & Tech
- Production & Operations Mgt
- Physics
- Agricultural Extension
- Biochemistry
- Social Studies
- Religious & Cultural Studies
- Estate Management
- English
- Theatre Arts
- Banking and Finance
- Forestry & Wildlife
- Electrical & Electronics
- Curriculum Studies
- Animal Science
- Business Management
- Secretarial Studies
- Geology
- Home Economics
- Library Science
- Civil Engineering
- Statistics
- Geography
- Chemical Engineering
- Educational Technology
- International Relations
- New Project Topics
- Human Kinetics