ABSTRACT
Online Data logging system makes use of Encryption. Encryption is the process of converting messages or data into a form that cannot be read without decrypting or deciphering it. Information technology has done a lot in the field of banking work. A lot of tools have been developed to assist in the banking sector. This project work is concern in the design and implementation of online data logging system used in first bank of Nigeria Enugu branch. Online data logging system is essential to any organization. This has been previously done by manual method. But this project is aimed at online data logging system to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of visual basic programming language and other programming language.
TABLE OF CONTENT
Title
page i
Approval
page ii
Dedication iii
Acknowledgement iv
Abstract v
Table
of content
Chapter
one
1.0 Introduction 1
- statement of the
problem 2
- Purpose of study 3
- Aims and
objective of the study 3
- Scope of study 4
- Constraints 4
- Assumptions 5
- Definition of
terms. 5
Chapter
two
Chapter
three
- Description and
analysis of the existing system 10
- Method of data
collection 11
- Objective of the
existing system 11
- Input/process/output
analysis 13
- Information flow
diagram 15
Chapter
four
Design
of new system 16
- Output
specification and design 16
- Input
specification and design 17
Chapter
five
5.0 Implementation 22
Chapter
six
Chapter
seven
Summary,
recommendation and conclusion 29
CHAPTER ONE
INTRODUCTION
Online
data logging system (ODLS) is an important aspect of any system. Online
data logging system is the act of ensuring that an authenticated user accesses
only what they are authorized to and no more. The bad news is that
security is rarely at the top of people’s lists, although mention terms such as
data confidentiality, sensitivity, and ownership and they quickly become
interested. The good news is that there is a wide range of techniques
that you can apply to help secure access to your system. Three of the most popular
cryptography systems used are the Data logging/data encryption system Standard
(DES), Pretty Good Privacy (PGP), and the Rivest, Shamir, Adleman (RSA) system.
DES uses a single key for both encrypting and decrypting. It was developed by
International Business Machines Corporation (IBM) and approved by the United
States National Institute of Standards and Technology in 1976.
PGP is an encryption system that also uses two keys. It is
based on the RSA algorithm. PGP was invented by software developer Philip
Zimmerman and is one of the most common cryptosystems used on the Internet
because it is effective, free, and simple to use. PGP is such an effective
encryption tool that the United States government sued Zimmerman for releasing
it to the public, alleging that making PGP available to enemies of the United
States would endanger national security. The lawsuit was dropped, but it is
still illegal in some countries to use PGP to communicate with people in other
countries.
In the two-key system, also known as the public key system,
one key encrypts the information and another, mathematically related key
decrypts it. The computer sending an encrypted message uses a chosen private
key that is never shared and so is known only to the sender. All computers
authorized to receive and decrypt the message are given the matching public
key. This method also establishes who sent the message. If a sending computer
first encrypts the message with the intended receiver’s public key and again
with the sender’s secret, private key, then the receiving computer may decrypt
the message, first using its secret key and then the sender’s public key. Using
this public-key cryptographic method, the sender and receiver are able to
authenticate one another as well as protect the secrecy of the message. Single
key methods, in contrast, require great secrecy in conveying a key from sender
to recipient.
The length or complexity of
the key (along with the difficulty of the algorithm) usually indicates the
effectiveness of the encryption. DES, for example, uses 56 bits in its key to
change 8-character message segments into 64-bit segments of ciphertext. In 1997
the National Institute of Standards and Technology began coordinating
development of a new encryption system called Advanced Encryption Standard
(AES). AES is to replace DES, as it will use a stronger algorithm, based on a
128-bit encryption standard instead of the 64-bit standard that DES now uses.
Another advanced encryption system employs the International Data logging/data
encryption system Algorithm, or IDEA, based on 128-bit segments. The Swiss
Federal Institute of Technology developed the IDEA standard in the 1990s. Banks
in the United States and several countries in Europe use the IDEA standard for
many of their transactions.
- STATEMENT
OF THE PROBLEM
Owing to:
- Accessing the organizational
data/information unauthorized
- Fraudulent
act of some customer/workers
- Sensitive nature of bank data/information
- Valuable or costly items in bank
- Increase in crime in our society
The need arise for the development of online data logging system to eliminate such problems.