Preview

Highly Confidential Security System

Good Essays
Open Document
Open Document
1346 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Highly Confidential Security System
Highly Confidential Security System ABSTRACT- Due to busy life style we can’t remember all confidential data like All mail Id, Password, All bank account no. , Insurance policy no. , Pan card no. , Driving License no. , Passport no. ,All education certificate Numbers, Some highly valued scan copy, some confidential photos, music and videos. So we can develop highly security web application in which we can store all confidential data in single credentials. * HCSS keeps confidential data and provide high security. * It reduce all Efforts of any user to remember all id’s ,passwords they have and facilitate to use single id and password. * In this system whenever any transaction takes place from their account they get informed through a text messages or E-mails. * This System provides Video locker, image locker, music locker, bank account information locker, mail id and password locker. * It keeps past logs and also need extra credential to delete these logs. By using the past logs a user can undo all its transactions. * System also provides Login mobile verification. * This software is user friendly. Any literal person can handle the software for getting different form available on that software. This software is made in English language. * The software provide different login facility for user such as public people, administrator. Different authorized person can login here to modify self portfolio & and can access their confidential data. * Any extra technical skill is not require when any person want to handle this software. Only language and computer literacy is needed to understand that form column and its related information. This software is made secured to user that no other person can modified your personal data.

INTRODUCTION- The objective of HCSS is to provide a secure process & way to keep the users



References: - * Object Oriented Modeling and Design with UML-Michael Blaha, James Rambaugh. * Software Engineering, Seventh Edition, Ian Sommerville. * IBM Red Books. * IBM - www.ibm.in/developerworks . * Wikipedia - www.wikipedia.org * Database Management Systems – Korth Sudarshan. * Complete Reference - J2EE - Keogh.

You May Also Find These Documents Helpful

  • Best Essays

    This new system will allow them to save files and documents onto a new server, creating a centralized file system storage system, where only approved representatives are permitted. Having a centralized storage/retrieval system, also helps to secure the information being shared across the network. This also creates efficiency as only the server needs to be backed up, as opposed to having to secure many individual and independent workstations. In addition to…

    • 2802 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    NT 1230 FINAL EXAM REVIEW

    • 542 Words
    • 2 Pages

    used to make sure that you don’t reuse the same password when changing the password? Enforce Password History…

    • 542 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    It gives the person access using the sudo access, superuser capability and allows them to run programs with the…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Unit 10 Discussion 1

    • 156 Words
    • 1 Page

    From a forensic standpoint it can make it almost impossible to trace who actually logged into the system and will be time consuming and hard to prove.…

    • 156 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The different information systems are filing cabinets where hard copies are stores or electronically which can be saved changes can be made and they can be made safe with a password.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    These are basic steps towards securing the central database from attacks such as denial of service that is mainly caused by unauthorised access. The strategy is simple and less costly thus cannot cause strain on the budget.…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    The all-in-one computer security systems are effective in a way that it protects one’s computer from all the threats previously mentioned, spyware, viruses, and identity theft all-in-one package without the user having to worry about anything. An included feature is filter protection for any incoming and outgoing email for any virus and spam threats. Another threat that these all-in-one computer security systems are effective is they help protect one’s computer from hackers, and come with a built-in firewall that helps keeps all these threats away. These security systems are automatically scan for any threats and notify the user of any threats are detected. These all-in-one security systems are automatically updated without the user having to worry whether or not they have the latest information. An included feature that the Norton 360 comes with that are beneficial for individual users is the identify protection that securely keeps login and personal information safe, “guards against…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2.2 Password protection could be used to ensure security when storing and/or accessing information. Also ensuring that no-one who is…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Srs for Bank Management

    • 708 Words
    • 3 Pages

    The identity of each customer is verified and only then changes are made to the records each customer. After proper verification, the bank employee can bring proper changes to the database as per the requirements of…

    • 708 Words
    • 3 Pages
    Good Essays