Design and Implementation of Cyber Café Security System
This project study is focused on the design and development of security package for the Access Point Communication Limited.
This research work came to existence the time when internet café business is becoming very popular and vast. The principal objective of this project is to stop or deny access to an unauthorized user and also to ensure proper accountability of cash received by the cricketers.
Therefore the design and development of this internet security package for Access Point Limited is worthwhile. This project covers all the general procedure involved in the design and development of a reliable in-house software application package that will provide automated Customer services for a cyber café.
TABLE OF CONTENTS
Table of contents
1.1 Background of the study
1.2 Statement of Problem
1.3 Objective of the Project
1.4 Significance of the project
1.5 Scope of study
1.7 Definition of term
2.0 Literature review
2.1 What is internet?
2.2 Origin of Internet
2.3 Services provided by Internet
2.4 Internet Security
2.4.1 Internet Security problems
2.4.2 Problems of Internet Security problem
2.5 Efforts to solve Security Problems.
3.0 Analysis of the Existing System
3.2 Research Methodology
3.3 Detailed Analysis of the Existing System
3.3.1 Organizational / Companies Profile
3.3.2 The Organizational Structure of Different
3.3.3 Data Flow Diagram of the Existing System
3.4 Weakness of the Existing System
3.4.1 Analysis and Design of the New System
3.4.2 Objective of the New System
3.4.3 Program Design
3.4.4 Process Description of the New System
3.5 Control System Menu
3.6 File Attribute (Data Base Specification)
3.7 Administration Log in Data Base
3.8 Customers Log in Module Input and Screen Output
3.9 Add New Member Module Input and Screen
3.10 Admin Change Password Module Screen
3.11 Daily Report Input and Screen Output
3.12 Exit Program Module Input and Output Screen
3.13 Program Coding Platform
3.14 Choice of Programming Language
3.15 Output Design
4.0 System Implementation and Documentation
4.1 System Implementation
4.2 System Requirement
4.3 Hardware Requirement
4.4 Software Requirement
4.5 System Test-Run
4.6 System Changeover
4.7 Program Documentation
4.8 Running the Program
4.9 System Maintenance
5.0 Summary, Conclusion and Recommendation
Appendix A: Program Listing
Appendix B: Sample Output.
Appendix c: System Flowcharts
This is an introduction to the many threats that computer system and users face on the internet. Methods that users can implement to protect themselves are also explored. The security measures are used to gather, store, and distribute information as it is implemented differently across the web.
Many companies and corporations that collect sensitive data do not have proper security protocols put into place, which may compromise personal information.
Common errors that online businesses make when processing transactions will include information security and the protocols that they should put into place both in terms of their computer infrastructure, data collection and the establishment of personnel protocols, such as the handling of sensitive information and password changes.
ABDULLAHI, J. I, (2004) Introduction to the computer a Management tool.
AKUWUDIKEH C. AND UGWU O. I. (2002). Management Information system for Tertiary Institution. Gostak printing and publishing Co. Limited Enugu Nigeria.
CHIDIEBERE C. OPARAH (2003) Genesis of Computer Science print masters Akwa-Ibom State Nigeria.
CHARLES F. AND RICK W., (1996). Network Essentials Microsoft Press U.S.A.
CASH MAN I. J. AND SHALLY G. B. (2000). Discovering computers (2001) course Technology U.S.A
FRENCH, C. S. (1995). Computer Science (4th edition) London.
O.E. OSUAGUA (2003). Software Engineering structured System Analysis and Design. Methodology, Lecturer Note.
Join Over 3,500 000+ Readers Online Now!
COPYRIGHT WARNING! Contents on this website may not be republished, reproduced, redistributed either in whole or in part without due permission or acknowledgement. All contents are protected by DMCA.
The content on this site is posted with good intentions. If you own this content & believe your copyright was violated or infringed, make sure you contact us at [[email protected]] to file a complaint and actions will be taken immediately.