Design and Implementation of Cyber Café Security System : Current School News

Design and Implementation of Cyber Café Security System

APPLY NOW 👉 WORK IN CANADA WITH FREE SPONSORSHIP!


 

Design and Implementation of Cyber Café Security System.

ABSTRACT

This project study is focused on the design and development of security package for the Access Point Communication Limited.

This research work came to existence the time when internet café business is becoming very popular and vast.

The principal objective of this project is to stop or deny access to an unauthorized user and also to ensure proper accountability of cash received by the cricketers.

Therefore the design and development of this internet security package for Access Point Limited is worthwhile.

This project covers all the general procedure involved in the design and development of a reliable in-house software application package that will provide automated Customer services for a cyber café.

TABLE OF CONTENTS

Title page

Certification

Dedication

Acknowledgement

Abstract

Table of contents

CHAPTER ONE

1.1 Background of the study

1.2 Statement of Problem

1.3 Objective of the Project

1.4 Significance of the project

1.5 Scope of study

1.6 Limitations

1.7 Definition of term

CHAPTER TWO

2.0 Literature review

2.1 What is internet?

2.2 Origin of Internet

2.3 Services provided by Internet

2.4 Internet Security

2.4.1 Internet Security problems

2.4.2 Problems of Internet Security problem

2.5 Efforts to solve Security Problems.

CHAPTER THREE

3.0 Analysis of the Existing System

3.1 Introduction

3.2 Research Methodology

3.3 Detailed Analysis of the Existing System

3.3.1 Organizational / Companies Profile

3.3.2 The Organizational Structure of Different Section

3.3.3 Data Flow Diagram of the Existing System

3.4 Weakness of the Existing System

3.4.1 Analysis and Design of the New System

3.4.2 Objective of the New System

3.4.3 Program Design

3.4.4 Process Description of the New System

3.5 Control System Menu

3.6 File Attribute (Data Base Specification)

3.7 Administration Log in Data Base

3.8 Customers Log in Module Input and Screen Output

3.9 Add New Member Module Input and Screen Output

3.10 Admin Change Password Module Screen Output

3.11 Daily Report Input and Screen Output

3.12 Exit Program Module Input and Output Screen

3.13 Program Coding Platform

3.14 Choice of Programming Language

3.15 Output Design

CHAPTER FOUR

4.0 System Implementation and Documentation

4.1 System Implementation

4.2 System Requirement

4.3 Hardware Requirement

4.4 Software Requirement

4.5 System Test-Run

4.6 System Changeover

4.7 Program Documentation

4.8 Running the Program

4.9 System Maintenance

CHAPTER FIVE

5.0 Summary, Conclusion and Recommendation

5.1 Summary

5.2 conclusions

5.3 Recommendations

References

Appendices

INTRODUCTION

This is an introduction to the many threats that computer system and users face on the internet. Methods that users can implement to protect themselves are also explored. The security measures are used to gather, store, and distribute information as it is implemented differently across the web.

Many companies and corporations that collect sensitive data do not have proper security protocols put into place, which may compromise personal information.

Common errors that online businesses make when processing transactions will include information security and the protocols that they should put into place both in terms of their computer infrastructure, data collection and the establishment of personnel protocols, such as the handling of sensitive information and password changes.

REFERENCES

ABDULLAHI, J. I, (2004) Introduction to the computer a Management tool.
AKUWUDIKEH C. AND UGWU O. I. (2002). Management Information system for Tertiary Institution. Gostak printing and publishing Co. Limited Enugu Nigeria.
CHIDIEBERE C. OPARAH (2003) Genesis of Computer Science print masters Akwa-Ibom State Nigeria.
CHARLES F. AND RICK W., (1996). Network Essentials Microsoft Press U.S.A.
CASH MAN I. J. AND SHALLY G. B. (2000). Discovering computers (2001) course Technology U.S.A
FRENCH, C. S. (1995). Computer Science (4th edition) London.
O.E. OSUAGUA (2003). Software Engineering structured System Analysis and Design. Methodology, Lecturer Note.

APPLY NOW 👉 WORK IN CANADA WITH FREE SPONSORSHIP!


 

    Hey You!

    Don't Miss These Opportunity! Enter Your Details Below!


    => FOLLOW US ON INSTAGRAM | FACEBOOK & TWITTER FOR LATEST UPDATE

    Tags:

    Comments are closed.

    %d bloggers like this: