0704-883-0675     |      dataprojectng@gmail.com

DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style: APA
  • Recommended for : Student Researchers
  • NGN 5000

STATEMENT OF THE PROBLEM

The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.

The choice of data encryption comes next in the minds of those that want reduction of unauthorized access on confidential files or data. Security provided by the computer operating systems come with a preset super user account and password. The super user may have a password to control network functionality, another to conduct or access nightly backups, create accounts, and so on. For a cracker, logging on to a system as the super user is possibly the best way to collect data or do damage. If the super user has not changed an operating system’s preprogrammed passwords, the network is vulnerable to attack. Most crackers know these passwords, and their first attempt to break into a network is simply to try them. If an attacker cannot log on as the super user, the next best thing might be to figure out the user name and password of a regular user. It is used to be standard practice in most Universities and colleges, and in some commercial companies, to assign every student or employee an account with user name and initial password – the password being the user name. Everyone was instructed to log on and change the password, but often, hackers and crackers logged on before legitimate users had a chance.

 





Related Project Materials

A REVIEW ON THE IMPACT OF STRESS ON ACADEMIC ACHIEVEMENT OF  UNIVERSITY STUDENT

ABSTRACT

The main purpose of this research work was to review the impact of stress on academic achievem...

Read more
PAY DISSATISFACTION AMONG CIVIL SERVICE WORKERS IN NIGERIA

Abstract

Pay constitutes an integral part of the success of any organization. It motivates employees to...

Read more
The Role of AI-Powered Chatbots in Customer Service Marketing: A Case Study of First Bank in Borno State

Background of the Study

AI-powered chatbots have transformed customer service marketing by offering efficient, round-the...

Read more
The Impact of Electoral Systems on Local Political Leadership: A Case Study of Nasarawa LGA, Nasarawa State

Chapter One: Introduction

1.1 Background of the Study

The electoral system plays a critical role in shaping political leadershi...

Read more
The Role of Accounting Information System in Fraud Detection in Commercial Organizations in Nasarawa Local Government Area

Background of the Study

Fraud is a major concern in commercial organizations, often le...

Read more
An Investigation of Policies for Improving Rural Employment in Gwandu Local Government, Kebbi State

Chapter One: Introduction

1.1 Background of the Study

Rural employment remains a significant challenge in many parts of Nigeria...

Read more
GSM BASED REMOTE SWITCHING SYSTEM

Background of study

Has technology transformed humankind into omniscient being? Years back, communication was done through difficult mean...

Read more
The Role of Radio in Promoting Girl Child Education: A Study of Sokoto South Local Government Area, Sokoto State

Background of the Study
The promotion of girl child education has been a critical issue in many parts of Nigeria, particula...

Read more
The Impact of Smart Cities on Environmental Sustainability in Abuja

Background of the Study

The concept of smart cities involves integrating technology, data-driven solutions, and innovati...

Read more
THE ROLE OF THE FORENSIC ACCOUNTANT IN FRAUD DETECTION IN NIGERIA

Background to the Study

The trend and the volume are increasing on a daily basis and all levels of the society are invo...

Read more
Share this page with your friends




whatsapp