This document is a project report on automated color detection system submitted by Prem Vijay Borse to fulfill the requirements of a diploma in computer engineering. The report includes an introduction outlining the need for computerized network security. It also includes chapters on literature review, existing system analysis, proposed new system design, implementation details, and conclusions. The overall aim is to design a computerized network security system to replace the existing manual process and address issues like fraudulent activities and unauthorized access of data in banks.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
GI-FI (Gigabit Fidelity) or Giga bit wireless refers to wireless communication at a data rate of more than one billion bits (gigabits) per second. GI-FI offers some advantages over WI-FI, a similar wireless technology. In that it offers faster information rate in GBPS, less power consumption and low cost for short range transmission as compare to current technology. GI-FI consists of a chip which has facility to deliver short-range multi gigabit data transfer in a local environment and compared to other technologies in the market it is ten times faster. GI-FI has the data transfer speed up to 5 GBPS within a short-range of 10 metres. It operates in 60 GHZ frequency band. GI-FI is developed on an integrated wireless transceiver chip. It has both transmitter and receiver, integrated on a single chip which is fabricated using the CMOS (complementary metal oxide semiconductor) process and it also consists of a small antenna. GI-FI allows transferring large videos, audio files, data files etc. within few seconds.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
GI-FI (Gigabit Fidelity) or Giga bit wireless refers to wireless communication at a data rate of more than one billion bits (gigabits) per second. GI-FI offers some advantages over WI-FI, a similar wireless technology. In that it offers faster information rate in GBPS, less power consumption and low cost for short range transmission as compare to current technology. GI-FI consists of a chip which has facility to deliver short-range multi gigabit data transfer in a local environment and compared to other technologies in the market it is ten times faster. GI-FI has the data transfer speed up to 5 GBPS within a short-range of 10 metres. It operates in 60 GHZ frequency band. GI-FI is developed on an integrated wireless transceiver chip. It has both transmitter and receiver, integrated on a single chip which is fabricated using the CMOS (complementary metal oxide semiconductor) process and it also consists of a small antenna. GI-FI allows transferring large videos, audio files, data files etc. within few seconds.
The Internet of Things (IoT), sometimes referred to as the Internet of Objects, IoT is basically a complex network that seamlessly connects people and things together through the Internet. Theoretically, anything that can be connected (smart watches, cars, homes, thermostats, vending machines, servers…) and will be connected in the near future using sensors and RFID tags. This allows connected objects to continuously send data over the Web and from anywhere. The first time the term was used in 1999 by Kevin Ashton, the creator of the RFID standard.
This is my report that i did for my industrial placement or what one would call internship. It has some detailed information that can help anyone in the field of IT.
It has all sorts of topics like networks, systems administration and many others.
This presentation gives brief description of Wi-Fi Technolgy, standards, applications,topologies, how Wi-Fi network works, security,advantages and innovations.
This presentation describes the implementation of the Internet of Things(IoT) in the Oil and Gas industry. It also tells about the benefits of implementing IoT in this industry.
Students' Industrial Work Experience Scheme (SIWES) is a scheme developed for Undergraduates in NIGERIA to gain experience in the industry before graduating.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
The Internet of Things (IoT), sometimes referred to as the Internet of Objects, IoT is basically a complex network that seamlessly connects people and things together through the Internet. Theoretically, anything that can be connected (smart watches, cars, homes, thermostats, vending machines, servers…) and will be connected in the near future using sensors and RFID tags. This allows connected objects to continuously send data over the Web and from anywhere. The first time the term was used in 1999 by Kevin Ashton, the creator of the RFID standard.
This is my report that i did for my industrial placement or what one would call internship. It has some detailed information that can help anyone in the field of IT.
It has all sorts of topics like networks, systems administration and many others.
This presentation gives brief description of Wi-Fi Technolgy, standards, applications,topologies, how Wi-Fi network works, security,advantages and innovations.
This presentation describes the implementation of the Internet of Things(IoT) in the Oil and Gas industry. It also tells about the benefits of implementing IoT in this industry.
Students' Industrial Work Experience Scheme (SIWES) is a scheme developed for Undergraduates in NIGERIA to gain experience in the industry before graduating.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
Cloud Computing is a heavily evolving domain in technology. Many public and private entities are shifting their workstations on the cloud due to its robust, remote, virtual environment. Due to the enormity of this domain, it has become increasingly easier to carry out any sort of malicious attacks on such cloud platforms. There is a very low research done to develop the theory and practice of cloud forensics. One of the main challenges includes the inability to collect enough evidence from each and every subscriber of a Cloud Service Provider(CSP) and thus not being able to trace out the roots of the malicious activity committed. In this paper we compare past research done in this field and address the gaps and loopholes in the frameworks previously suggested. Overcoming these, our system/framework facilitates the collection, organization, and thereby the analysis of the evidence sought, hence preserving the essential integrity of the sensitive and volatile data.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxtoltonkendal
Running Head: NETWORK INFRASTRUCTURE VULNERABILITIES1
NETWORK INFRASTRUCTURE VULNERABILITIES3
Project Paper: Network Infrastructure vulnerabilities
Name
Institutional Affiliations
Section 1: Infrastructure Document
Computer networks have increasingly become ubiquitous and synonymous especially with the organizations that thrive on excellence, as well as, those who would want to adopt cloud technology and virtualization within their companies. Today, most organizations that set up their businesses ensure that they have incorporated an efficient computer network infrastructure that will connect the business to the outside world through Internets. This is because, research has shown that the present business depend heavily on network infrastructure platforms that make communication easy, efficient, available, as well as, accessible. Consequently, despite the fact that robust computers networks have made it easier by providing a basis of interactivity and bringing a whole lot of people and businesses together, all these at one point have amounted to growing security concerns over the past years across various sectors and industries. This paper will therefore identify some of the possible network infrastructure vulnerabilities, as well as, describing a comprehensive security policy that helps in protecting the company infrastructure and assets by applying the principle of CIA.
A network consists of devices such as routers, firewalls, generic and hosts which include servers and workstations. Equally, there are thousands of network vulnerabilities; therefore, organizations should ensure that they focus on tests that will produce a good overall assessment of the network especially when they store their data in the cloud, however, there may be risk of non-compliance and regulation, due to lack of control over where data is stored. The possible network infrastructure vulnerabilities include; improper system configuration, poor firewall deployment, poor anti-virus implementation, weak password implementation, lack of efficient physical security, lack of appropriate security policies and many others. Vulnerabilities can be successfully contained by putting measure in place, for example, the Network Administrator should be in position to gather information about viruses and worms, as well as, identifying network vulnerabilities by getting information that helps in preventing security problems. Security measures for Network vulnerabilities can be accessed through three main stages which involve planning, conducting and inference (Markluec, 2010). In planning stage, there is an official agreement that is signed between the concerned parties. The document signed is important because it will contain both legal and non-disclosure causes that serve to protect the ethical hacker against possible law suit. Conducting stage involves the evaluation of technical reports prepared based on testing potential vulnerabilities. Lastly, in inference stage, the ...
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper discusses security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for technical and business community.
In the past decade, internet of things (IoT) has been a
focus of research. Security and privacy are the key issues for IoT
applications, and still face some enormous challenges. In order to
facilitate this emerging domain, we in brief review the research
progress of IoT, and pay attention to the security. By means of
deeply analyzing the security architecture and features, the
security requirements are given. On the basis of these, we discuss
the research status of key technologies including encryption
mechanism, communication security, protecting sensor data and
cryptographic algorithms, and briefly outline the challenges.
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...Autohaus Service and Sales
Learn what "PARKTRONIC Inoperative, See Owner's Manual" means for your Mercedes-Benz. This message indicates a malfunction in the parking assistance system, potentially due to sensor issues or electrical faults. Prompt attention is crucial to ensure safety and functionality. Follow steps outlined for diagnosis and repair in the owner's manual.
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs AttentionBertini's German Motors
IBS monitors and manages your BMW’s battery performance. If it malfunctions, you will have to deal with an array of electrical issues in your vehicle. Recognize warning signs like dimming headlights, frequent battery replacements, and electrical malfunctions to address potential IBS issues promptly.
Why Is Your BMW X3 Hood Not Responding To Release CommandsDart Auto
Experiencing difficulty opening your BMW X3's hood? This guide explores potential issues like mechanical obstruction, hood release mechanism failure, electrical problems, and emergency release malfunctions. Troubleshooting tips include basic checks, clearing obstructions, applying pressure, and using the emergency release.
In this presentation, we have discussed a very important feature of BMW X5 cars… the Comfort Access. Things that can significantly limit its functionality. And things that you can try to restore the functionality of such a convenient feature of your vehicle.
Comprehensive program for Agricultural Finance, the Automotive Sector, and Empowerment . We will define the full scope and provide a detailed two-week plan for identifying strategic partners in each area within Limpopo, including target areas.:
1. Agricultural : Supporting Primary and Secondary Agriculture
• Scope: Provide support solutions to enhance agricultural productivity and sustainability.
• Target Areas: Polokwane, Tzaneen, Thohoyandou, Makhado, and Giyani.
2. Automotive Sector: Partnerships with Mechanics and Panel Beater Shops
• Scope: Develop collaborations with automotive service providers to improve service quality and business operations.
• Target Areas: Polokwane, Lephalale, Mokopane, Phalaborwa, and Bela-Bela.
3. Empowerment : Focusing on Women Empowerment
• Scope: Provide business support support and training to women-owned businesses, promoting economic inclusion.
• Target Areas: Polokwane, Thohoyandou, Musina, Burgersfort, and Louis Trichardt.
We will also prioritize Industrial Economic Zone areas and their priorities.
Sign up on https://profilesmes.online/welcome/
To be eligible:
1. You must have a registered business and operate in Limpopo
2. Generate revenue
3. Sectors : Agriculture ( primary and secondary) and Automative
Women and Youth are encouraged to apply even if you don't fall in those sectors.
Symptoms like intermittent starting and key recognition errors signal potential problems with your Mercedes’ EIS. Use diagnostic steps like error code checks and spare key tests. Professional diagnosis and solutions like EIS replacement ensure safe driving. Consult a qualified technician for accurate diagnosis and repair.
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Hyundai Motor Group
What’s the force behind Hyundai Motor Group's EV performance and quality?
Maximized driving performance and quick charging time through high-density battery pack and fast charging technology and applicable to various vehicle types!
Discover more about Hyundai Motor Group’s EV platform ‘E-GMP’!
𝘼𝙣𝙩𝙞𝙦𝙪𝙚 𝙋𝙡𝙖𝙨𝙩𝙞𝙘 𝙏𝙧𝙖𝙙𝙚𝙧𝙨 𝙞𝙨 𝙫𝙚𝙧𝙮 𝙛𝙖𝙢𝙤𝙪𝙨 𝙛𝙤𝙧 𝙢𝙖𝙣𝙪𝙛𝙖𝙘𝙩𝙪𝙧𝙞𝙣𝙜 𝙩𝙝𝙚𝙞𝙧 𝙥𝙧𝙤𝙙𝙪𝙘𝙩𝙨. 𝙒𝙚 𝙝𝙖𝙫𝙚 𝙖𝙡𝙡 𝙩𝙝𝙚 𝙥𝙡𝙖𝙨𝙩𝙞𝙘 𝙜𝙧𝙖𝙣𝙪𝙡𝙚𝙨 𝙪𝙨𝙚𝙙 𝙞𝙣 𝙖𝙪𝙩𝙤𝙢𝙤𝙩𝙞𝙫𝙚 𝙖𝙣𝙙 𝙖𝙪𝙩𝙤 𝙥𝙖𝙧𝙩𝙨 𝙖𝙣𝙙 𝙖𝙡𝙡 𝙩𝙝𝙚 𝙛𝙖𝙢𝙤𝙪𝙨 𝙘𝙤𝙢𝙥𝙖𝙣𝙞𝙚𝙨 𝙗𝙪𝙮 𝙩𝙝𝙚 𝙜𝙧𝙖𝙣𝙪𝙡𝙚𝙨 𝙛𝙧𝙤𝙢 𝙪𝙨.
Over the 10 years, we have gained a strong foothold in the market due to our range's high quality, competitive prices, and time-lined delivery schedules.
What Exactly Is The Common Rail Direct Injection System & How Does It WorkMotor Cars International
Learn about Common Rail Direct Injection (CRDi) - the revolutionary technology that has made diesel engines more efficient. Explore its workings, advantages like enhanced fuel efficiency and increased power output, along with drawbacks such as complexity and higher initial cost. Compare CRDi with traditional diesel engines and discover why it's the preferred choice for modern engines.
Things to remember while upgrading the brakes of your carjennifermiller8137
Upgrading the brakes of your car? Keep these things in mind before doing so. Additionally, start using an OBD 2 GPS tracker so that you never miss a vehicle maintenance appointment. On top of this, a car GPS tracker will also let you master good driving habits that will let you increase the operational life of your car’s brakes.
"Trans Failsafe Prog" on your BMW X5 indicates potential transmission issues requiring immediate action. This safety feature activates in response to abnormalities like low fluid levels, leaks, faulty sensors, electrical or mechanical failures, and overheating.
What Does the Active Steering Malfunction Warning Mean for Your BMWTanner Motors
Discover the reasons why your BMW’s Active Steering malfunction warning might come on. From electrical glitches to mechanical failures and software anomalies, addressing these promptly with professional inspection and maintenance ensures continued safety and performance on the road, maintaining the integrity of your driving experience.
What Does the Active Steering Malfunction Warning Mean for Your BMW
NIS.docx
1. 1
A
PROJECT REPORT
ON
Automated Color detection System
IN THE PARTIAL FULFILLMENT OF DIPLOMA IN
COMPUTER ENGINEERING
SUBMITTED BY
Prem Vijay Borse
GUIDED BY
Mr.D.M.Fegade
DEPARTMENT OF COMPUTER ENGINEERING
(Subject Code: 22620)
MGSM’S
SMT. SHARCHCHANDRIKA SURESH PATIL INSTITUTE OF
TECHNOLOGY (POLYTECHNIC) CHOPDA, JALGAON
2. 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Master Prem Vijay Borse Of 6th Semester of Diploma in Smt.Sharachchandrika
Suresh Patil Institute of technology Polytechnic Chopda, (Code:0061) has completed the Micro Project
satisfactorily in the Subject NIS (22620) for the Academic Year 2022-2023 as prescribed in the
curriculum.
Place: Chopda Enrollment No: 2000610054
Date: Exam. Seat No:
Subject Teacher Head of the Department Principal
Seal of
Institution
3. 3
ACKNOWLEDGEMENT
I take this opportunity to express our sincere gratitude to all those who had helped us in various
capacities in undertaking this project and devising the report.
I am privileged to express our gratitude to our respected teacher Mr.Aniket Dabhade whose
unparalleled knowledge, moral fiber and judgment along with this his know-how, was an immense
support in completing the project.
I am grateful to Prof.D.M.Fegde Sir, the Head of our Computer Department, for the brain wave and
encouragement given.
I take this opportunity also to thank our Honorable Principal Sir Prof.Mr.V.N.Borse Sir for his intense
and most valuable guidance to us.
Mr.Prem Vijay Borse
4. 4
ABSTRACT
Network Security is essential to any organization. This has been previously done by manual method.
But this project is aimed at computerized Network Security to make the work easier.
This is possible because of the advance improvement in information technology as pertaining
programming language; because this is achieved by the help of visual basic programming language
and other programming language.
For the first few decades of their existence, computer networks were primarily used by university
researchers for sending e-mail and by corporate employees for sharing printers. Under these
conditions, security did not get a lot of attention.
But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax
returns, network security is looming on the horizon as a potentially massive problem. The
requirements of information security within an organization have undergone.
Two major changes in the last several decades before the widespread use of data processing
equipment the security of information felt to be valuable to anorganization was provided primarily by
physical and administrative means with the introduction of computer the need for automated tools
for protecting filesand other information stored on the computer became an evident
This is especially the case for a shared system such as time sharing system and the need is even more
acute for systems that can be accessed for a public telephone or a data network the generic name for
the collection of tools to protect data and to thwart computer security‖.
In its simplest form, it is concerned with making sure that nosy people cannot read, or worse yet,
secretly modify messages intended for other recipients.
5. 5
TABLE OF CONTENT
Title page i
Approval page ii
Certification iii
Dedication iv
Acknowledgement v
Abstract vi
Table of content vii
CHAPTER ONE
1.0 Introduction 1
1.1 Statement of the problem 5
1.2 Purpose of study 6
1.3 Aims and objective of the study 6
1.4 Scope of study 7
1.5 Limitations 7
1.6 Assumptions 7
1.7 Definition of terms 8
CHAPTER TWO
2.0 Literature review 10
CHAPTER THREE
3.0 Description and analysis of the existing system 16
3.1 Fact Finding Method Used 16
3.2 Objective of the existing system 17
3.3 Organizational chart 18
3.4 Input/process/output analysis 19
3.5 Information flow diagram 20
6. 6
CHAPTER FOUR
4.0 Design of new system 21
4.1 Output specification and design 21
4.2 Input specification and design 22
4.3 File design 23
4.4 Procedure chat 23
4.5 System flowchart 24
CHAPTER FIVE
5.0 Implementation 26
5.1 Program design 26
5.2 Program flowcharts 28
5.3 Documentation 29
5.4 Recommendation 30
5.5 Conclusion 30
5.6 Summary 32
Reference 35
Appendix I 36
Appendix II 37
7. 7
CHAPTER ONE
1.0 INTRODUCTION
Several recent proposals have argued for giving third parties and end-users control over routing in the
network infrastructure. Some examples of such routing architectures include TRIAD [6], i3 [30],
NIRA [39], Data Router [33], and Network Pointers [34]. While exposing control over routing to
third-parties departs from conventional network architecture, these proposals have shown that
such control significantly increases the flexibility and extensibility of these networks.
Using such control, hosts can achieve many functions that are difficult to achieve in the Internet
today. Examples of such functions include mobility, multicast, content routing, and service
composition. Another somewhat surprising application is that such control can be used by hosts to
protectthemselves from packet-level denial-of-service (DOS) attacks [18], since, at the extreme, these
hosts can remove the forwarding state that malicious hosts use to forward packets to the hosts. While
each of these specific functions can be achieved using a specific mechanism—for example, mobile IP
allows host mobility— we believe that these forwarding infrastructures (FIs) provide architectural
simplicity and uniformity in providing several functions that makesthem worth exploring. Forwarding
infrastructures typically provide user control by either allowing source-routing (such as [6], [30], [39])
or allowing users to insert forwarding state in the infrastructure (such as [30], [33], [34]). Allowing
8. 8
forwarding entries enables functions like mobility and multicast that are hard to achieve using source-
routing alone.
While there seems to be a general agreement over the potential benefits of user- controlled routing
architectures, the security vulnerabilities that they introduce has been one of the important concerns
that has been not addressed fully. The flexibility that the FIs provide allows malicious entities to
attack both the FI as well as hosts connected to the FI.
For instance, consider i3 [30], an indirection-based FI which allows hosts to insert forwarding entries
of the form (id,R), so that all packets addressed to id are forwarded to R. An attacker A can eavesdrop
or subvert the traffic directed to a victim V by inserting a forwarding entry (idV ,A); the attacker can
eavesdrop even when it does not have access to the physical links carrying the victim’s traffic.
Alternatively, consider an FI that provides multicast; an attacker can use such an FI to amplify a
flooding attack by replicating a packet several times and directing all the replicas to a victim.
These vulnerabilities should come as no surprise; in general, the greater the flexibility of the
infrastructure, the harder it is to make it secure.
In this project, we improve the security that flexible communication infrastructures which provide a
diverse set of operations (such as packet replication) allow. Our main goal in this project is to show
that FIs are no more vulnerable than traditional communication networks (such as IP networks) that
do not export control on forwarding. To this end, we present several
9. 9
mechanisms that make these FIs achieve certain specific security properties, yet retain the essential
features and efficiency of their original design. Our main defense technique, which is based on light-
weight cryptographic constraints on forwarding entries, prevents several attacks including
eavesdropping, loops, andtraffic amplification. From earlier work, we leverage some techniques, such
as challenge-responses and erasure-coding, to thwart other attacks.
NETWORK SECURITY
(NS) is an important aspect of any system. NETWORK SECURITY is the act of ensuring that an
authenticated user accesses only what they are authorized to and no more. The bad news is that
security is rarely at the top of people's lists, although mention terms such as data confidentiality,
sensitivity, and ownership and they quickly become interested. The good news is that there is a wide
range of techniques that you can apply to help secure access to your system. The bad news is that as
Mitnick and Simon (2002) point out ―…the human factor is the weakest link. Security is too often
merely an illusion, an illusion sometimes made even worse when gullibility, naivette, or ignorance
come into play.‖ The go on to say that ―security is not a technology problem – it’s a people and
management problem.‖ Having said that, my experience is that the ―technology factor‖ and the
―people factor‖ go hand in hand; you need to address both issues to succeed.
10. 10
Access control is the ability to permit or deny the use of a particular resource by a particular entity.
Access control mechanisms can be used in managing physical resources (such as a movie theater, to
which only ticket holders should be admitted), logical resources (a bank account, with a limited
number of people authorized to make a withdrawal), or digital resources (for example, a private text
document on a computer, which only certain users should be able to read).
Banks are secured financial institutions. They are often housed in large buildings that are located in a
commercial or residential area. Banks storemoney and other financial information and goods.
Money and valuables have been stored in banks since ancient times. As a result of the long history
that banks have enjoyed, bank security has also been important for a long time. Some of the oldest
banks in the world have the best security available. These banks include the Bank of Sweden, the
Bank or England, Bank of America, and Swiss Banking.
Bank security usually includes a staff of security guards, a security system, and one or more vaults.
Security guards are uniformed personnel that maintain high visibility and watch cameras and alarms.
Cameras and alarms are usually top of the line systems in banks and other financial buildings. But
these security elements are not exclusive to banks. Some of these elements can be found in other
commercial buildings and even residential homes.
11. 11
Basic security starts with the locks. For a high level of security, windows and doors will need the best
locks. After high quality locks are installed many property owners opt for a security system or even
security cameras.
Security cameras are often a small part of a larger security system. Systems often include motion
detectors, alarms, sensors, and cameras. Cameras arearguably the most important because they allow
the property owner to see and record everything that happens in and around their building or property.
Cameras can be installed by a professional or by a property owner. For a large and elaborate system it
may be best for a professional to do the work. But for a smaller and easy layout, a property owner
should have no problem installing a system by following the manufactures instructions. If he does
than there is usually a local installer that can be called to help finish the job.
1.1 STATEMENT OF THE PROBLEM
Owing to:
1. Fraudulent act of some customer/workers
2. Accessing the organizational data/information unauthorized
3. Sensitive nature of bank data/information
4. Valuable or costly items in bank
12. 12
5. Increase in crime in our society
The need arise for the development of computerized NETWORK SECURITYto eliminate such
problems.
1.2 PURPOSE OF STUDY
The main purpose of this project is to design a NETWORK SECURITY thatwill assist UBA in
the area of ensuring effective security measures.
1.3 AIMS AND OBJECTIVES
This project will have the following aims and objectives:
Detecting security violations
Re-creating security incidents
To disallow unauthorized users
To safeguard the organizational data/information
To computerized the organizational security
To enhance the organizational security
To eliminate all forms of mistakes associated with security control
13. 13
1.4 SCOPE OF STUDY
This research work will access the design and implementation of NETWORK SECURITY in UBA
Enugu. It will look into the operations of this bank in the aspect of computerizing their security
control system.
1.5 CONSTRAINTS
This project will be limited to the data available at hand, data outside the researcher will not be made
use of.
The limitations militating against this research are financial constraints, time factor and other
circumstances.
1.6 ASSUMPTIONS
Accuracy, efficiency and reliability is associated with Network Security.
For the purpose of this research, my assumptions can be stated as follows:
1. The application of computer related garget for security control
2. A computerized Network Security is effective and dependable
1.7 DEFINITION OF TERMS
Administration is an aspect of running the organization by devising systemswhich will run smoothly.
2. Client: This any process that request specific services from serverprocesses.
14. 14
3. Computer: This is an electrons machine that can accept; handle and manipulate data by
performing arithmetic and logic operations without human intervention usually under the
control of programmes.
4. Data: This is fore runner of information. It is unprocessed fact.
5. Database is a collection of information that is related to a particular subject or purpose.
6. Hardware: This is the electromechanical part of computer system.
7. Information: This is data that have been processed, interpreted and understood by the
recipient of the message or report.
8. Internet is a collection of computer networks that operate to common standards and enable the
computes and the program they run to communicate directly.
9. Server: This is a process that provides requested services for clients.
10. Software: This is a logically written program that hardware uses toperform it’s operation.
11. System is the collection of hardware, software, data information,
procedures and people.
12. Website is a space or location customized by a company, organization oran individual which
is locatable within an address on the internet.
15. 15
CHAPTER TWO
2.0 LITERATURE REVIEW
According to John J. Murphy, Technical Analysis of the Financial Markets Authentication is the act
of determining the identity of a user and of the host that they are using. The goal of authentication
is to first verify that the user, either a person or system, which is attempting to interact with your
system is allowed to do so. The second goal of authentication is to gather information regarding the
way that the user is accessing your system. For example, a stock broker should not be able to make
financial transactions during off hours from an Internet café, although they should be able to do so
from their secured workstation at their office. Therefore gathering basic host information, such as its
location and security aspects of its connection (is it encrypted, is it via a physical line, is the
connection private, …), is critical.
There are several strategies that you can follow to identify a client:
User id and password. This is the most common, and typically the simplest, approach to
identifying someone because it is fully software- based.
Physical security device. A physical device, such as a bank card, a smart card, or a computer
chip (such as the ―Speed Pass‖ key chains used by gas stations) is used to identify a
person. Sometimes a password or
16. 16
personal identification number (PIN) is also required to ensure that it isthe right person.
Biometric identification. Biometrics is the science of identifying someone from physical
characteristics. This includes technologies such as voice verification, a retinal scan, palm
identification, and thumbprints.
According to McKay, Peter A, A , Authorization is the act of determining the level of access that an
authorized user has to behavior and data. This section explores the issues surrounding authorization,
there is often more to it than meets the eye, and then explores various database and object-oriented
implementation strategies and their implications.
Issues.
Fundamentally, to set an effective approach to authorization the first questionthat you need to
address is ―what will we control access to?‖ My experience is that you can secure access to both
data and functionality, such as access toquarterly sales figures and the ability to fire another
employee respectively. Your stakeholders’ requirements will drive the answer to this question.
However, the granularity of access, and your ability to implement it effectively,is a significant
constraint. For example, although you may be asked to controlaccess to specific columns of specific
rows within a database based on complexbusiness rules you may not be able to implement this in a
cost effective mannerthat also conforms to performance constraints.
17. 17
The second question that you need to answer is ―what rules are applicable?‖ The answer to this
question is also driven by your stakeholders’ requirements; although you may need to explore various
security factors that they may not be aware of (they’re not security experts after all). These factors,
which are often combined, include:
Connection type.
Update access.
Time of day.
Existence.
Cascading authorization.
Global permissions.
Combination of privileges.
Database Implementation Strategies
Let’s start by reviewing the concepts of roles and security contexts. A role is a named collection of
privileges (permissions) that can be associated to a user. So, instead of managing the authorization
rights of each individual user you instead define roles such as HR_ Manager, HR_ User,
Manufacturing Engineer, Accountant, and so on and define what each role can access. You then
assign users to the roles, so Sally Jones and her co-workers would be associated with
18. 18
the role of Manufacturing Engineer. Someone else could be assigned the roles of HR_ Manager and
HR_ User if appropriate. The use of roles is a generic concept that is used by a wide range of
technologies, not just databases, to simplify the security administration effort.
A security context is the collection of roles that a user is associated with. The security context is often
defined as part of the authentication process. Depending on the technology used a security context is
maintained by the system, this is very common in GUI applications, or must be passed around by the
system, something that is common with browser-based n-tier system. A combination of the two
strategies is also common.
Authorization can be enforced within your database by a variety of means (which can be combined).
These techniques include:
Permissions. Permission is a privilege or authorization right, that a user or role has
regarding an element (such as a column, table, or even the database itself). A permission
defines the type of access that that ispermitted, such as the ability to update a table or to run a
stored procedure. In SQL, permissions are given via the GRANT command and removed via
the REVOKE command. When a user attempts to interact with a database his or her
permissions are checked, and if the user is not authorized to perform part of the interaction,
which could be a transaction, the interaction fails and an error is returned.
19. 19
Views. You can control, often to a very fine level, the data that a user can access via the use
of views. This is a two-step process. First, you define views that restrict the tables, columns,
and rows within the tables that a role can access. Second, you define permissions on those
views.
Stored procedures. Code within the stored procedure can be written toprogrammatically
check security access rules.
Proprietary approaches. A new option being offered by some database vendors is proprietary
security tools. One example is Oracle Label Security, an add-on that enables you to define
and enforce row-level permissions.
The primary goal of database security is to ensure that there isn’t any
―backdoor‖ ways to access critical corporate data. Many organizations choose to disallow ad-hoc
queries to production databases to help minimize the chance of unauthorized access (as well as to
avoid the associated performance problems). Many organizations introduce reporting databases such
as data marts to support ad-hoc queries. According to Gregory J. Millman on his book titled Access
Control System Operation, when a credential is presented to a reader, the reader sends the credential’s
information, usually a number, to a control panel, a highly reliable processor. The control panel
compares the credential's number to an access control list, grants or denies the presented request, and
sends a transition log to a database. When access is denied based
20. 20
on the access control list, the door remains locked. If there is a match between the credential and the
access control list, the control panel operates a relay that in turn unlocks the door. The control panel
also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a
flashing red LED for an access denied and a flashing green LED for an access granted.
The above description illustrates a single factor transaction. Credentials can be passed around, thus
subverting the access control list. For example, Alice has access rights to the server room but Bob
does not. Alice either gives Bob her credential or Bob takes it; he now has access to the server room.
To prevent this, two-factor authentication can be used. In a two factor transaction, the presented
credential and a second factor are needed for access to be granted. The second factor can be a PIN, a
second credential, operator intervention, or a biometric input. Often the factors are characterized as
something you have, such as a credential,
Something you know, e.g. a PIN.
21. 21
CHAPTER THREE
3.0 DESCRPTION AND ANALYSIS OF THE EXISTING SYSTEM
The existing system of Network Security maintained by UBA Enugu is a manual system. There have
been a lot of lapses concerning the operations involved in the computerized Network Security.
One of the primary roles of Network Security is to satisfy the needs of customers and the
organization thereby maximizing profit.
3.1 FACT FINDING METHOD USED
The researcher used the following method of data collection in writing the project.
a. Interview method: People that deal on computerized Network Security where
interviewed to share their opinion concerning the manual method.
b. Written Document: A lot of documents concerning computerized Network Security
where studied from which I gather useful information for the project.
c. Observation: Observation method was also used to get information concerning the
project.
22. 22
3.2 OBJECTIVES OF THE EXISTING SYSTEM
The main objectives of the existing include:
1. To eliminate all forms of mistakes associated with security control
2. Detecting security violations
3. Re-creating security incidents
4. To disallow unauthorized users
5. To safeguard the organizational data/information
6. To computerized the organizational security
7. To enhance the organizational security
23. 23
FIG1: ORG ON
HEAD OF
C/M
DEPUTY
MANAGER
HEAD OF
OPERATION
INTER
AUDITOR
BRANCH
MANAGER
3.3 ORGANISATION CHART
MESSAGER
ANISATI
COPORATE
ACCOUNT
MG
FUND
TRANSFER
UNIT
CUSTOME
R SERVICE
UNIT
SYSTEM
STAFF
CASH
AND
TELLER
SECRETARY
CHIEF
SECRETARY
CHIEF
DRIVER
ACE
OFFICER
ACE
OFFICE
ACCOUNT
OFFICE
COMPUTE
MAINTAIN
INTER
OPERATION
24. 24
3.4 INPUT/PROCESS/OUTPUT ANALYSISINPUT
ANALYSIS
Since the major activity carried out by the computerized NETWORK SECURITY
management is the changing of currency to customers, the following are the requirements of
this management from their customers.User log-in Account
User Name Password
Retype Password
NAME ACCOUNT
NO
TYPE OF CURRENCY DATE
OF TRANNSTION
PROCESS ANALYSIS
All the input specifications are put into consideration and specification ofauthenticity carried out
before an activity is accomplished.
Necessary signatures are signed and clarified without any waste of time. At theend, accuracy is
achieved and loopholes does not abound.
25. 25
3.5 INFORMATION FLOW DIAGRAM
INFORMATION MANGER
CERTIFIED LOAN SCHEME
INFORMATION
SURVEILLANCE &
INSPECTORATE
LOAN SCHEME
MANAGEMENT RAM DATA
GENERAL MANAGER
APPLICATION
INFORMATION
CASHIER
REQUEST
CUSTOMER
26. 26
CHAPTER FOUR
4.0 DESIGN OF A NEW SYSTEM
The design of the new system is born out of the report from the analysis of the existing system. The
new system is automatic in operation and its features are represented in computer coding formats
under this chapter.
4.1 OUTPUT SPECIFICATION AND DESIGN
The output specification includes:User
Name
Password Retype
PasswordNAME
ACCOUNT NO
TYPE OF CURRENCY DATE
OF TRANNSTION
27. 27
VALIDATION FORM
User Name:
Password
Retype
User Name Retype Password
NAME ACCOUNT NO TYPE OF CURRENCY
DATE OF TRANNSTION
4.2 INPUT SPECIFICATION AND DESIGNTHE
INPUT ELEMENTS ARE
S/N FIELD NAME FIELD
VARIABLE
FIELD
WIDTH
FIELD TYPE
USERNAME UN 20 TEXT
PASSWORD P 15 TEXT
RETYPE PASSWORD RP 20 TEXT
ACCOUNT NO AN 16 NUMBER
DATE OF TRANNSTION DOT 10 NUMBER
NAME N 15 TEXT
USER LOG-IN FORM
28. 28
NAME ACCOUNT NO
TYPE OF CURRENCY AMOUNT TO CHANGE
DATE OF TRANNSTION
LOG-IN
EXIT
PROGRAM
CLEARANCE AT
COMPLETION
UPDATING
INFORMATION
EXCHANGE
MGT SYSTEM
MAIN MENU
Supply of data
for system
processing is
achieved here
The deletion and
update of record
takes place here
This certifies that
a customer has
cleared his debts
This option
terminates the
running program
4.3 FILE DESIGN
4.4 PROCEDURE CHART
29. 29
THE FOREIGN EXCHANGE DATA IS
KEYED IN FROM THE KEYBOARD
UPDATE OF
RECORD
DOC
DATA PROCESSING
DELETE OF
RECORD
DOC
DOC
FOREIGN EXCHANGE
REPORT
DATA
STORAGE
DISK
GENERATE FOREIGN EXCHANGE
INFORMATION ON SCREEN
4.5 SYSTEM FLOWCHART
31. 31
CHAPTER FIVE
5.0 IMPLEMENTATION
The computer needs to understand the design of the new system for its effective operations and use.
The design has to be coded in computer understandable formats. The structures are designed under
this chapter.
5.1 PROGRAM DESIGN
The programming is made under modules which are:
FILE ORGANIZATION MODULE
This module handles data entry and storage. It consists of data entry screen which is the medium
through which data is entered into the computer system. The data received is stored automatically by
commanding the computer to save.
INFORMATION UPDATA MODLE
The information update module makes it possible for modification to be effected on already
maintained record. This module makes the system to be flexible and reliable.
INFORMATION REQUIREMENT MODULE
Accurate report generation is made possible through this module, the comprehensive report of the
system under this module. The particular report generator depends on the user’s request.
32. 32
PROCESSING MODLE
This module carries out action on the supplied data in order to achieve the bestdesired result.
EXIT MODULE
This module terminates the running of the program.
33. 33
5.2 PROGRAM FLOWCHART
START
ENTER PASSWORD
IF CORRECT
NO
YES
DISPLAY MENU OPTIONS
INPUT OPTIONS (1 – 4)
OPTION = 1
NO
OPTION = 2
NO
OPTION = 3
NO
OPTION = 4
YES
STOP
EDIT
RECORDS
UPDATE
RECORDS
ADD
RECORDS
34. 34
5.3 DOCUMENTATION
This project is divided into five chapters. Chapter one consists of the introduction, purpose of study,
aims and objectives, scope, constraints, assumptions and definition of terms.
Chapter two is literature review while chapter three is the description and analysis of the existing
system which is made up of organizational chart, objectives, methods of data collection,
input/process/output, information flow diagram and justification.
Chapter four is the design of a new system. It contains the output specification, input specification and
file design, flowchart and system requirements.
Chapter five is implementation which consists of program design, program flowchart, pseudo codes,
source program, test run
Documentation, summary, recommendation and conclusion.
PROGRAM HELP MENU
This program was coded in a programming language called VISUAL BASIC. The program is run
through Window into the VBASIC directory. There, it is expected that laying in the program and
pressing F5, one can view the NETWORK SECURITY system as done in UBA Enugu. Clicking exist
on the file menu will quit the program. The file name for the program is FOREIGN EXCHANGE
program
35. 35
5.4 RECOMMENDATION & CONCLUSION
5.5 RECOMMENDATION
This great research is recommended to individuals who are involved in one business transaction or the
other, that they continue to fulfill their motives by making profit through NETWORK SECURITY.
5.6 CONCLUSION
In computer security, access control includes authentication, authorization and audit. It also includes
measures such as physical devices, including biometric scans and metal locks, hidden paths, digital
signatures, encryption, social barriers, and monitoring by humans and automated systems.
In any access control model, the entities that can perform actions in the system are called subjects, and
the entities representing resources to which access may need to be controlled are called objects (see
also Access Control Matrix). Subjects and objects should both be considered as software entities,
rather than as human users: any human user can only have an effect on the system via the software
entities that they control. Although some systems equate subjects with user IDs, so that all processes
started by a user by default have the sameauthority, this level of control is not fine-grained enough to
satisfy the Principle of least privilege, and arguably is responsible for the prevalence of malware in
such systems (see computer insecurity).
36. 36
In some models, for example the object-capability model, any software entity can potentially act as
both a subject and object.
Access control models used by current systems tend to fall into one of two classes: those based on
capabilities and those based on access control lists (ACLs). In a capability-based model, holding an
unforgivable reference or capability to an object provides access to the object (roughly analogous to
how possession of your house key grants you access to your house); access is conveyed to another
party by transmitting such a capability over a secure channel. In an ACL-based model, a subject's
access to an object depends on whether its identity is on a list associated with the object (roughly
analogous to how a bouncer at a private party would check your ID to see if your name is on the guest
list); access is conveyed by editing the list. (Different ACL systems have a variety of different
conventions regarding who or what is responsible for editing the list and how it is edited.)
Both capability-based and ACL-based models have mechanisms to allow accessrights to be granted to
all members of a group of subjects (often the group is itself modeled as a subject).
37. 37
Access control systems provide the essential services of identification andauthentication (I&A),
authorization, and accountability where:
identification and authentication determine who can log on to a system, and the association
of users with the software subjects that they are ableto control as a result of logging in;
authorization determines what a subject can do;
Accountability identifies what a subject (or all subjects associated with auser) did.
5.7 SUMMARY
Routing is one of the most important parts of the infrastructure that keeps a network running, and as
such, it is absolutely critical to take the necessary measures to secure it. There are different ways
routing can be compromised, from the injection of illegitimate updates to DOS specially designed to
disrupt routing. Attacks may target the router devices, the peering sessions, and/or the routing
information. Fortunately, protocols like BGP, IS-IS, OSPF, EIGRP and RIPv2 provide a set of tools
that help secure the routing infrastructure. This section provides the guidelines for using such tools.
The router's primary functions are to learn and propagate route information, and ultimately to forward
packets via the most appropriate paths. Successful attacks
38. 38
against routers are those able affect or disrupt one or more of those primary functions by
compromising the router itself, its peering sessions, and/or the routing information.
Routers are subject to the same sort of attacks designed to compromise hosts and servers, such as
password cracking, privilege escalation, buffer overflows, and even social engineering. Most of the
best practices in this document help mitigate and even prevent some of those threats.
Peering relationships are also target of attacks. For most routing protocols routers cannot exchange
route information unless they establish a peering relationship, also called neighbor adjacency. Some
attacks attempt to break established sessions by sending the router malformed packets, resetting TCP
connections, consuming the router resources, etc. Attacks may also prevent neighbor adjacencies from
being formed by saturating queues, memory, CPU and other router resources. This section of the
document presents a series of bestpractices to protect neighbor adjacencies from those threats.
Finally, routing can also be compromised by the injection of false route information, and by the
modification or removal of legitimate route information. Route information can be injected or altered
by many means, ranging from the insertion of individual false route updates to the installation of
bogus routers into the routing infrastructure. Potential denial of service conditions may result from
intentional loops or black-holes for particular destinations. Attackers may
39. 39
also attempt to redirect traffic along insecure paths to intercept and modify user's data, or simply to
circumvent security controls. This section also includes a collection of best practices designed to
prevent the compromising of routing information.
40. 40
REFERENCES
Anderson, A.C. (2006). Cryptography and network security. New York: ABantam Press.
Applied cryptography. (2001). Computer security. U.S.A: CRC Press.
Apostolou, B. (2000). Internal fraud Investigation. Louis Avenue: Institute ofInternal Auditor’s
Publication.
A.C.F.E. (2002). Report on fraud Occurrence. http: www.wikipedia.com Boyle, L., & Panko, H.
(2009). Corporate Computer Security. America: Bank
of Settlement.
Bishop, A.A. (2011). Threats Security. France: Art and Science.Bytes (2011).
Security tool. http://www. Securebytes.com
Chukwu, L.C. (2010). Securing and Investigation. Owerri: BensonPublication.
Casey, E. (2010). Handbook of Investigation. U.S.A: Academic PressPublication.
Chandelle, V. (2001). Anomaly detection. India: University ofMinnesota
Publication.
Howard, L., & Leblanc, K. (2002). Writing Secure code. U.S.A: EditingMicrosoft Press.
John, J. (2001). A Triennial Central Bank survey. London: Bank forInternational Settlements.
Simmons, A. (December 2010). Ontology for Network Security Attack.
Lecture note in Computer science.
Solomon, P.O. (November 2000). Encrypting Messages. Russia: EncryptingMessages Centre.
41. 41
APPENDIX I
PSEUDOCODE
Press F5 to run the program. Press any key to continue.
1. Enter password
2. initialize variables
3. input data records
4. is data ok
5. if yes write data to disk
6. add more variables
7. if yes repeats step 1
8. end
EDIT RECORD
1. Enter record No to Edit
2. Does record exist
3. If yes then edit record
4. Edit another record
5. If yes then repeat step 1
6. End
DELETE RECORD
1. Enter record No to delete
2. Does record exist
3. If yes then update database
4. End if
5. Delete another
6. If yes then repeat step 1
7. Stop
48. 48
End Sub
Private Sub
Label3_Click()Unload
Me
End
End
Sub
Private Sub Label3_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single)
Label3.ForeColor = vbWhite
End Sub
Private Sub
Label4_Click()
REPORT.Show
Me.Hid
eEnd
Sub
Private Sub Label4_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single)
Label4.ForeColor = vbWhite
End Sub
Private Sub
Label5_Click()
about.Show
Me.Hid
eEnd
Sub
Private Sub Label5_MouseMove(Button As Integer, Shift As Integer, X As Single, Y As Single)
Label5.ForeColor = vbWhite
End Sub