DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DATA SECURITY SYSTEM A CASE STUDY OF LEECON FINANCE AND INVESTMENT LTD

57 PAGES (4632 WORDS) Computer Science Project
ABSTRACT

Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance. 
Due to unauthorized access to data in database, repose disclosure or modification will invade individual process, computers have been produced with an encipher and decipher package in various computer language like C++, paschal, Fortran, visual basic etc. voting modified from or RSA cipher encryption, the package is two keys are required. The two keys are public key and secret key respectively. 
The project is aimed at developing a computer data security system using data, encryption know as cryptography to LEECOM FINANCE AND INVESTMENT LTD. it also takes a look at the present data security of LEECOM FINANCE AND INVESTMENT LTD, identifying the problems encountered in carrying out these process.    


TABLE OF CONTENTS

Title Page 
Certification 
Dedication 
Acknowledgement 
Organization of work
Table of content 
Abstract 

CHAPTER ONE
1.1INTRODUCTION 
1.2Background of the Study 
1.3Statement of the Problem 
1.4Purpose of Study 
1.5Importance of Significance of the Study 
1.6Scope and Delimitation 
1.7Limitation 
1.8Assumption 
1.9Definition of Term 

CHAPTER TWO 
2.1LITERATURE REVIEW  

CHAPTER THREE 
3.1Description and Analysis of the Existing System 
3.2Facts Findings Methods Used 
3.3Objectives of the Existing System 
3.4Organizational Structure 
3.5Input, Process and Output Analysis 
3.6Information Flow Diagram 
3.7Problem of the Existing System 
3.8Justification for the New System 

CHAPTER FOUR
4.1Design of the New System 
4.2Input Specification and Design 
4.3Output Specification and Design
4.4File Design 
4.5Production Chart 
4.6System Flow Chart 
4.7System requirements

CHAPTER FIVE 
IMPLEMENTATIONS 
5.1Program Design 
5.2Program Flow Chart 
5.3Pseudo Code 
5.4Source Program
5.5Test Run

CHAPTER SIX
DOCUMENTATION 

CHAPTER SEVEN
RECOMMENDATION AND CONCLUSION 
7.1Recommendation 
7.2Conclusion 
REFERENCE