his project study is focused on the design and development of security package for the Access Point Communication Limited.
This research work came to existence the time when internet café business is becoming very popular and vast. The principal objective of this project is to stop or deny access to an unauthorized user and also to ensure proper accountability of cash received by the ticketers. Therefore the design and development of this internet security package for Access Point Limited is worth while.
This project covers all the general procedure involved in the design and development of a reliable in-house software application package that will provide automated Customer services for a cyber café. These procedures include the initial
Design, coding, testing, implementation, maintenance and enhancement of the new system. Thus this software will provide an accurate timing and billing information at any point in time for a cyber café operation.
Title page
Certification
Dedication
Acknowledgement
Abstract
Table of contents
CHAPTER ONE
1.1 Background of the study 1
1.2 Statement of Problem 2
1.3 Objective of the Project 3
1.4 Significance of the project 4
1.5 Scope of study 4
1.6 Limitations 5
1.7 Definition of term 5
CHAPTER TWO
2.0 Literature review
2.1 What is internet? 8
2.3 Services provided by Internet 9
2.4 Internet Security 11
2.4.1 Internet Security problems 12
2.4.2 Problems of Internet Security problem 12
2.5 Efforts to solve Security Problems. 14
CHAPTER THREE
3.0 Analysis of the Existing System 19
3.1 Introduction 19
3.2 Research Methodology 19
3.3 Detailed Analysis of the Existing System 20
3.3.1 Organizational / Companies Profile 20
3.3.2 The Organizational Structure of Different
Section 25
3.3.3 Data Flow Diagram of the Existing System 26
3.4 Weakness of the Existing System – 29
3.4.1 Analysis and Design of the New System 31
3.4.2 Objective of the New System 31
3.4.3 Program Design 32
3.4.4 Process Description of the New System 33
3.5 Control System Menu 34
3.6 File Attribute (Data Base Specification) 34
3.7 Administration Log in Data Base 35
3.8 Customers Log in Module Input and Screen Output 35
3.9 Add New Member Module Input and Screen
Output 36
3.10 Admin Change Password Module Screen
Output 37
3.11 Daily Report Input and Screen Output 37
3.12 Exit Program Module Input and Output Screen 38
3.13 Program Coding Platform 38
3.14 Choice of Programming Language 39
3.15 Output Design 40
CHAPTER FOUR
4.0 System Implementation and Documentation 41
4.1 System Implementation 41
4.2 System Requirement 42
4.3 Hardware Requirement 42
4.4 Software Requirement 43
4.5 System Test-Run 43
4.6 System Changeover 44
4.8 Running the Program 45
4.9 System Maintenance 46
CHAPTER FIVE
5.0 Summary, Conclusion and Recommendation 47
5.1 Summary 47
5.2 conclusions 48
5.3 Recommendations 49
References 50
Appendices
Appendix A: Program Listing
Appendix B: Sample Output.
Appendix c: System Flowcharts
Design and development of internet security package. (n.d.). UniTopics. https://www.unitopics.com/project/material/design-and-development-of-internet-security-package/
“Design and development of internet security package.” UniTopics, https://www.unitopics.com/project/material/design-and-development-of-internet-security-package/. Accessed 22 November 2024.
“Design and development of internet security package.” UniTopics, Accessed November 22, 2024. https://www.unitopics.com/project/material/design-and-development-of-internet-security-package/
Here’s a typical structure for Design and development of internet security package research projects:
- The title page of Design and development of internet security package should include the project title, your name, institution, and date.
- The abstract of Design and development of internet security package should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
- The introduction of Design and development of internet security package should provide the background information, outline the research problem, and state the objectives and significance of the study.
- Review existing research related to Design and development of internet security package, identifying gaps the study aims to fill.
- The methodology section of Design and development of internet security package should describe the research design, data collection methods, and analytical techniques used.
- Present the findings of the Design and development of internet security package research study using tables, charts, and graphs to illustrate key points.
- Interpret Design and development of internet security package results, discussing their implications, limitations, and potential areas for future research.
- Summarize the main findings of the Design and development of internet security package study and restate its significance.
- List all the sources you cited in Design and development of internet security package project, following a specific citation style (e.g., APA, MLA, Chicago).