Computer Science Project Topics

Design and Implementation of Cybercafe Security (a Case Study of Access Point Communication Limited Umuahia)

Design and Implementation of Cybercafe Security (a Case Study of Access Point Communication Limited Umuahia)

Design and Implementation of Cybercafe Security (a Case Study of Access Point Communication Limited Umuahia)

Chapter One

OBJECTIVES OF THE PROJECT   

The objective of this research work is to develop an Internet Security Package consisting of a client billing software program with modification of existing software and eliminating the entire obstacle in previous versions of the numerous existing clients billing software program. Apart from producing an enhancement,

It will also:

  1. Prepare daily account of all transactions with clients
  2. Produce analyzed report for decision making
  3. Provide security to enhance system lock when credit expires.
  4. Automatically generate numbers as ID’S and allocate time and payments by clients.
  5. Enable the system within the network to identify user with particular name and password.

CHAPTER TWO

 LITERATURE REVIEW

WHAT IS INTERNET

The internet is a vast network of computer networks. A wide world collection of network and gateways that uses the TC/IP suite of protocols of communication with each other according to cashman and shally (2000), the internet is not owned or founded by any one individual, institution, organization or government. It is not a commercial service. The internet is however directed by the internet society (ISOC).

ORIGIN OF THE INTERNET

In late 1960’s a group  of scientists at the US department of Defense Advanced Research Project Agencies (ARPA) wanted to share information with others working on similar research project many of whom were government contractors working at universities.

Thus ARPA net was developed to link this university. When people at this institution discovered the enormous utility of a network that linked them with their colleagues around the world the project mushroomed.

As the network expanded through the 1970’s members of the computer industry began to participate and the internet became an online heaven for computer researchers and academics. This decentralized network called ARPA net created by the Department Of Defense in 1969 to facilitate communication in the event of a nuclear attack was eventually linked to other network including Bitnet, Usenet and NStnet thus forming what is called the internet (www. Ask.com)

SERVICES PROVIDED BY INTERNET

There are several or quite a number of services provided by the internet that make it easier to share information. They are:

WWW: Stands for the World Wide Web. This part of the net contains the website you can visit. You can see web pages with the help of special program called browser with the help of a gently used browser. The most frequently used browser are Microsoft internet explorer and Netscape navigator both are free.

Website owners can submit relevant keywords, title and descriptions for their sites to search engines, directories or guides. These are special sites that do nothing but index and categorize other web site by key words title descriptions so you can search for them.

E-MAIL:  E-mail stands for electronic mail it’s the most used marketing vehicle on the internet. This easy to function combines text processing and the possibilities. A mail box at your ISP receives and stores electronic messages that you download once you are connected. And you can send electronic messages to others. Your ISP will give detail on how to set the parameter for your incoming and outgoing mail boxes (French 1995)

NEWS GROUPS: Newsgroups, are meeting places for people discussing a special topic you can read and send messages about the topic. There are newsgroups about almost any kind of subjects. The subjects are more or less categorized. You can recognize a main group of related topic by the first characters of the group.

ALT = Alternatives

BIZ = Business

REC = Recreation

Biz, forsake tells you that you can post messages to this newsgroup that are not moderated. This means that if you post message to the group it can be read, unchanged by every certain etiquette. And if your message does not comply with this your can get in real trouble. The other members may flame you which means you will receive some very nasty letters (www.ask.com).

 INTERNET SECURITY  

This is the practice of protecting and preserving private information’s and resources on the internet (www.ask.com)

INTERNET SECURITY PROBLEMS

Internet suffers from severe security problems and site that ignore these problems face some significant risk. That internet will attack them aim that they provide intruders with a staging ground for attacks on other networks. Even sites that do observe ground security practices face Problems with new vulnerabilities in networking software and the persistence of some intruders.

PROBLEMS OF INTERNET SECURITY

The internet has suffered from a significant and widespread security problems. A number of factors have contributed to the poor security of the internet, the lapses included:

(I) VULNERABILITY OF TCP/IP SERVICES

A number of the TCP/IP services are not secured and can be compromised by knowledgeable hackers; services used in the local area network management are especially vulnerable.

(II) CASE OF SPOOFING AND SPYING

The majority of internet traffic unencrypted mail, relatively inexpensive equipment and capture using common software can monitor password and file transfer.

 

CHAPTER THREE

SYSTEMS ANALYSIS

INTRODUCTION

In this chapter, the process carried out in each session of Access Point Communication Limited will be listed. The detailed analysis of the existing system and the data flow diagram (DFD) of the existing systems of cyber café and the computer institute sections will be discussed in this section coupled with weakness and strength. Also the reason for a new system and expectations from this new system will be discussed in this chapter.

RESEARCH METHODOLOGY

Obviously research methodology refers to the method employed in various aspect of the course of the project, the following research are adopted for the project.

  1. The structured system analysis and design methodology (SSADM) will be adopted throughout the analysis and design stage.
  2. Interviewing and discussing with the staff of internet administrators of Access Point Communication Limited (cyber café department) located at Umuahia Abia state.

DETAILED ANALYSIS OF THE EXISTING SYSTEM

Analyses are concerned with two things: the project definition and the system study, according to Sprague and Carlson (1988). The purpose of a system analysis definition in DSS construction is to identify problem and a set of capabilities that users consider helpful in arriving at decision of the matter at hand, and then the solution is sort after.

CHAPTER FOUR

SYSTEM IMPLEMENTATION AND DOCUMENTATION

 SYSTEM IMPLEMENTATION

System implementation is the planned and orderly conversion from an existing system to a new one. It involves five tuning system elements in order to maximize efficiency and productivity. Parts of the task include completing documentation and evaluating the final design to make sure that the system meets designed goal and objectives.

The task list may be developed specifying what must be done: The task list for implementation of the new internet café automation system is as followed;

  • Specifying hardware and software requirement
  • Evaluate system test-run
  • Prepare change over time table
  • Under take system maintenance

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

SUMMARY

In all, this project together with its fruits aimed at saving the management of Access point communication Limited, the trouble and difficulties in running an internet café manual. Apart from the many benefits acquiring from the full. Internet development software which were highlighted in the introduction chapters of this project a lot of barriers has been broken and extra feature achieved in this direction include:

  1. Create more customer friendly environment.
  2. Increase efficiency in the access cyber café department of the Access point communication limited.
  3. Improve control of all the activities of the computer users in the internet café.
  4. more accurate billing and information
  5. Deny access to authorized users.

Finally, this software because of its capability could be implemented in any institution where you have computer for public use but limited supply such as libraries and school computer libraries.

CONCLUSION

The café billing software for Access point communication limited (Access Cyber Café) is user friendly in house software system designed especially for access cyber café. It is a product of fifty-generation language and thus possesses the features accompany the fifth generation technology. Café billing software for access Cyber Café when fully implemented will promote efficient running of the access cyber café by providing accurate timing and billing information. The software is developed for access cyber café. But because of its flexibility and portability it can be modified and used in any internet café.

RECOMMENDATION

Despite the wonderful features of access cyber café, software started in the previous chapters and in conclusion section above further improves on this same topic by other researcher as this software cannot only run on a standalone computer.

REFERENCES

  • ABDULLAHI, J. I, (2004) Introduction to the computer a Management tool.
  • AKUWUDIKEH C. AND UGWU O. I. (2002). Management Information system for Tertiary Institution. Gostak printing and publishing Co. Limited Enugu Nigeria.
  • CHIDIEBERE C. OPARAH (2003) Genesis of Computer Science print masters Akwa-Ibom State Nigeria.
  • CHARLES F. AND RICK W., (1996). Network Essentials Microsoft Press U.S.A.
  • CASH MAN I. J. AND SHALLY G. B. (2000). Discovering computers (2001) course Technology U.S.A
  • FRENCH, C. S. (1995). Computer Science (4th edition) London.
  • O.E. OSUAGUA (2003). Software Engineering structured System Analysis and Design. Methodology, Lecturer Note.