Secured Online Examination Result System (Using Public Key Infrastructure (Pm))

Abstract

This Study Showed How Efficiency And Security Can Be Enhanced In The Management Of Examination Result Of Students In The School Of Computer Studies The Researchers Went To The Case Study And Used Interview, Observation And Dissemination Of Questionnaires, To Collect Data At The School With A Bias Towards The Examination Office. This Data Was Then Analyzed And A Using Software Development Life Cycle (Sdlc) Developed A Secured Network Application. (Secured Online Examination Result Management System)


TABLE OF CONTENT


DECLARATION.................................................. ii

DEDICATION............................................................ iii

ACKNOWLEDGEMENTS.................................................. iv

ABBREVIATIONS................................................................ v

TABLE OF CONTENT............................................................... vii

LIST OF FIGURES ..........................................................xii

LIST OF TABLES............................................................ xiii

ABSTRACT......................................................................... xiv

CHAPTER ONE........................................................................... 1

1.1 Background................................................................. 1

1.2 Statement Of The Problem ...................................................2

1.3 Objectives ...................................................................................3

1.3.1 Main Objective................................................................. 3

1.3.2 Specific Objectives ..................................................3

1.4 Research Questions............................................................... 3

1.5 Scope.................................................................................. 4

1.6 Justification......................................................................... 4

1.7 Limitations Of The Study ........................................................5

1.8 Conclusion........................................................................... 5

CHAPTER TWO......................................................................... 7

LITERATURE REVIEW....................................................... 7

2.1 Introduction........................................................................ 7

2.2. Information System.............................................................. 7

2.2.1 Types Of Infonnation Systems~................................................... 7

2.2.2 Benefits Of~i Infonnation Syste................................................ 9

2.2.3 Designing A Management Information System ........................9

2.3 Software Development............................................................ 12

2.4 Security 14

2.4.1 Classification OfEncryption A1gorit~s 14

2.4.2 Security T1~eats & Requirements 15

2 4 3 Security Services & Mechanisms 16

2 44 Network Security Protocols 17

245 Secure Socket Layer & Transport Layer Security (SSL/TLS) 18

2 5 Emeigence Of Public Key Cryptography (Pkc).................... 20

2.5.1 Emergence Of Public Key Cryptography (PKC) ......................21

2.5.2 Public Key Cryptography (Asymmetric Key Cryptography).......... 22

2.6 Application: Secure Electronic Transaction (SET) ..........................22

2.6.1 Description........................................................ 22

2.7 Certificate Authority......................................................... 22

2.8 The Digital Certificate (Public Key Certificate)............................... 23

2.8.1 Description....................................................... 23

CHAPTER THP~E ...........................................................25

METHODOLOGy .....................................................................25

3.1 Introduction ............................................................................25

3.2 Procedure Of The Study............................................................... 25

3.3 Population Of The Area Of Study 25

viii

3.4 Data collection method.s .26

3.4.1 Primaiy Methods ...... 26

3.5 Analysis Of The Current System 26

3.5.1 Strengths of the current system ~.... 26

3.5.2 Weaknesses Of The Current System ~,... 26

3.6 The Proposed System ................................................................27

3.7 System Requirements 27

3.7.1 Hardware Requirements -,.................................................... ,.,. 27

3.7.2 Software Requirements .......................................................28

3.7.3 Security Requirement ............................................................30

3.8 Feasibility Study............................................................................. 31

3.8.1 Introduction............................................................................... 31

3.8.2 Technical Feasibility................................................................ 32

3.8.3 Operational Feasibility.............................................................. 32

3.9 Feasibility Repo~.............................................................................33

3.10 Recommendation..................................................................

3.11 Benefits Of The Feasibility Study...........................................34

3.12 Conclusion........................................................................ 34

CHAPTER FOUR................................................................... 36

SYSTEM DESIGN ...............................................36

4.1 Introduction....................................................... 36

4.2 E-R (Entity RelationsInp) Model.......................................... 37

4.3 DFD For The New System .......................................39

4.4 Data Dictionary..........................................................................39

4.5 Data Description................................................................ 40

4.6 Data Structures......................................................................... 41

4.7 Data Elements ..........................................................42

4.8 Data Stores........................................................................ 43

4.9 Relational Model......................................................... 43

4.10 Physical Model.................................................................. 44

4.11 Database Design...................................................................... 47

4.12 Interface Design.............................................................. 47

4.13 Website Sitemap.............................................................. 48

4.14 Conclusion.................................................................... 48

CHAPTER FIVE........................................................................ 49

SYSTEM IMPLEMENTATION.......................................................... 49

5.1 Introduction..................................................................... 49

5.2 Main System Components....................................................... 50

5.2.1 User Registration........................................................... 50

5.2.2 User Authentication.............................................................. 52

5.2.3 Changing Profile......................................................................... 52

5.2.4 Recording Examination Marks ...................................................54

5.2.5 Reports .........................................................................55

5.3 Security Implementation .........................................................57

5.4 System Implementation Summary................................................... 58

5.5 Conclusion.................................................. 58

SIX ........................................................................ 59

~s4MENDATJON5 AND CONCLUSIONS.~................................... 59

• 1 Introduction.......................................................................... 59

6.2 Reconiji~endatjon • ,~... ..........................................59

6.3 conclusion,...............................................

6.4 Future Work.............................................. 61

APPENDIX A: QUE5TJo~AJRE.......................................... 62

REFERENCES ~................................................................ 65



Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Research, S. (2022). Secured Online Examination Result System (Using Public Key Infrastructure (Pm)). Afribary. Retrieved from https://tracking.afribary.com/works/secured-online-examination-result-system-using-public-key-infrastructure-pm

MLA 8th

Research, SSA "Secured Online Examination Result System (Using Public Key Infrastructure (Pm))" Afribary. Afribary, 31 Aug. 2022, https://tracking.afribary.com/works/secured-online-examination-result-system-using-public-key-infrastructure-pm. Accessed 24 Nov. 2024.

MLA7

Research, SSA . "Secured Online Examination Result System (Using Public Key Infrastructure (Pm))". Afribary, Afribary, 31 Aug. 2022. Web. 24 Nov. 2024. < https://tracking.afribary.com/works/secured-online-examination-result-system-using-public-key-infrastructure-pm >.

Chicago

Research, SSA . "Secured Online Examination Result System (Using Public Key Infrastructure (Pm))" Afribary (2022). Accessed November 24, 2024. https://tracking.afribary.com/works/secured-online-examination-result-system-using-public-key-infrastructure-pm