Ads: Get Admission into 200 Level and Study any Course in any University of Your Choice. Low Fees | No JAMB UTME. Call 09038456231

Design and Implementation of Cyber Café Security System

ADS! DOWNLOAD ANY PAST QUESTIONS AND ANSWERS (PDF VERSION)


Design and Implementation of Cyber Café Security System

ABSTRACT

This project study is focused on the design and development of security package for the Access Point Communication Limited.

This research work came to existence the time when internet café business is becoming very popular and vast. The principal objective of this project is to stop or deny access to an unauthorized user and also to ensure proper accountability of cash received by the cricketers.

Therefore the design and development of this internet security package for Access Point Limited is worthwhile. This project covers all the general procedure involved in the design and development of a reliable in-house software application package that will provide automated Customer services for a cyber café.

TABLE OF CONTENTS

Title page

Certification

Dedication

Acknowledgement

Abstract

Table of contents

CHAPTER ONE

1.1 Background of the study

1.2 Statement of Problem

1.3 Objective of the Project

1.4 Significance of the project

1.5 Scope of study

1.6 Limitations

1.7 Definition of term

CHAPTER TWO

2.0 Literature review

2.1 What is internet?

2.2 Origin of Internet

2.3 Services provided by Internet

2.4 Internet Security

2.4.1 Internet Security problems

2.4.2 Problems of Internet Security problem

2.5 Efforts to solve Security Problems.

CHAPTER THREE

3.0 Analysis of the Existing System

3.1 Introduction

3.2 Research Methodology

3.3 Detailed Analysis of the Existing System

3.3.1 Organizational / Companies Profile

3.3.2 The Organizational Structure of Different

Section

3.3.3 Data Flow Diagram of the Existing System

3.4 Weakness of the Existing System

3.4.1 Analysis and Design of the New System

3.4.2 Objective of the New System

3.4.3 Program Design

3.4.4 Process Description of the New System

3.5 Control System Menu

3.6 File Attribute (Data Base Specification)

3.7 Administration Log in Data Base

3.8 Customers Log in Module Input and Screen Output

3.9 Add New Member Module Input and Screen

Output

3.10 Admin Change Password Module Screen

Output

3.11 Daily Report Input and Screen Output

3.12 Exit Program Module Input and Output Screen

3.13 Program Coding Platform

3.14 Choice of Programming Language

3.15 Output Design

CHAPTER FOUR

4.0 System Implementation and Documentation

4.1 System Implementation

4.2 System Requirement

4.3 Hardware Requirement

4.4 Software Requirement

4.5 System Test-Run

4.6 System Changeover

4.7 Program Documentation

4.8 Running the Program

4.9 System Maintenance

CHAPTER FIVE

5.0 Summary, Conclusion and Recommendation

5.1 Summary

5.2 conclusions

5.3 Recommendations

References

Appendices

Appendix A: Program Listing

Appendix B: Sample Output.

Appendix c: System Flowcharts

INTRODUCTION

This is an introduction to the many threats that computer system and users face on the internet. Methods that users can implement to protect themselves are also explored. The security measures are used to gather, store, and distribute information as it is implemented differently across the web.

Many companies and corporations that collect sensitive data do not have proper security protocols put into place, which may compromise personal information.

Common errors that online businesses make when processing transactions will include information security and the protocols that they should put into place both in terms of their computer infrastructure, data collection and the establishment of personnel protocols, such as the handling of sensitive information and password changes.

REFERENCES

ABDULLAHI, J. I, (2004) Introduction to the computer a Management tool.

AKUWUDIKEH C. AND UGWU O. I. (2002). Management Information system for Tertiary Institution. Gostak printing and publishing Co. Limited Enugu Nigeria.

CHIDIEBERE C. OPARAH (2003) Genesis of Computer Science print masters Akwa-Ibom State Nigeria.

CHARLES F. AND RICK W., (1996). Network Essentials Microsoft Press U.S.A.

CASH MAN I. J. AND SHALLY G. B. (2000). Discovering computers (2001) course Technology U.S.A

FRENCH, C. S. (1995). Computer Science (4th edition) London.

O.E. OSUAGUA (2003). Software Engineering structured System Analysis and Design. Methodology, Lecturer Note.

Enter your email address:

Delivered by TMLT NIGERIA

Join Over 3,500 000+ Readers Online Now!


=> FOLLOW US ON INSTAGRAM | FACEBOOK & TWITTER FOR LATEST UPDATES

ADS: KNOCK-OFF DIABETES IN JUST 60 DAYS! - ORDER YOURS HERE

COPYRIGHT WARNING! Contents on this website may not be republished, reproduced, redistributed either in whole or in part without due permission or acknowledgement. All contents are protected by DMCA.
The content on this site is posted with good intentions. If you own this content & believe your copyright was violated or infringed, make sure you contact us at [[email protected]] to file a complaint and actions will be taken immediately.

Tags:

Comments are closed.