0704-883-0675     |      dataprojectng@gmail.com
1

1. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

2. Design and Implementation of an Intrusion Tolerant System

Abstract

The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...

Read more

3. DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

STATEMENT OF THE PROBLEM

The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.

The choice of data encryption comes next in...

Read more

4. DESIGN AND IMPLEMENTATION OF A STEGANOGRAPHIC SYSTEM- SECURTITY ENCRYPTION SYSTEM

ABSTRACT

Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...

Read more

5. EXPLORING THE APPLICATION OF NUMBER THEORY IN CRYPTOGRAPHY

Background of the study

Cryptography has a long and intricate history that intertwines with the development of number theory. From the ancient ciphers of Julius Caesar to the complex algorithms used in modern-day encryption, the evolution of cryptograph...

Read more

6. AN ASSESSMENT OF CYBERCRIME AND DIGITAL FORENSIC ACCOUNTING TECHNIQUES

Abstract: AN ASSESSMENT OF CYBERCRIME AND DIGITAL FORENSIC ACCOUNTING TECHNIQUES

This study assesses the effectiveness of digital forensic accounting techniques in combating cybercrime in the financial sector in Lagos. The objectives are to evaluate the effectiveness of various digital...

Read more
whatsapp