Site icon Premium Researchers

EXPERT SYSTEM FOR COMPUTER SECURITY

EXPERT SYSTEM FOR COMPUTER SECURITY

Need help with a related project topic or New topic? Send Us Your Topic 

DOWNLOAD THE COMPLETE PROJECT MATERIAL

EXPERT SYSTEM FOR COMPUTER SECURITY

Chapter one

1.0 Introduction

In the past, security was as simple as locking the door or placing documents in a closed filing cabinet or safe. Paper is no longer the only medium of choice for storing information. Files are maintained in both computer databases and filing cabinets. Many of our secrets are stored on hard drives and floppy discs.

In the physical world, security is a rather basic idea. If the locks on your house’s doors and windows are so sturdy that a thief cannot break in and take your possessions, your home is secure.

Security alarms may be installed to provide additional protection against intruders who break through the locks. Similarly, if someone attempts to fraudulently remove funds from your bank account but the teller requests identification and does not believe the thief’s tale, your money is safe.

When you sign a contract with another individual, the signatures serve as the legal power that compels both parties to keep their promise.

 

In the digital world, security functions similarly. One idea is privacy, which means that no one can break into your files to access sensitive data (such as medical records) or steal money (by collecting credit card numbers or online brokerage account information).

Privacy is the lock on the door. Another idea, data integrity, relates to a method that detects when something has changed. That is the alarm. We can verify identities through the process of authentication.

That is similar to the ID required to withdraw money from a bank account (or transact with an internet broker). Finally, non-repudiation is a legal force that encourages people to keep their word.

As the Internet becomes increasingly prevalent in daily life, the necessity for e-security grows. Any organisation that conducts online activities must identify and handle the associated e-security threats.

Many of these risk-management measures rely heavily on the proper application of cryptographic technology. The most critical security tool is cryptography.

1.1 Background of the Study

Prior to the modern era, cryptography was only concerned with message confidentiality (i.e., encryption) — converting messages from a comprehensible form to an incomprehensible one and back again at the other end, rendering them unreadable by interceptors or eavesdroppers who lacked secret knowledge (namely, the key required for decryption of that message).

In recent decades, the topic has extended beyond secrecy issues to encompass methods for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs, and secure computation, among other things.

Encryption is used to ensure the secrecy of communications between spies, military leaders, and diplomats, but it also has religious uses.

Steganography (i.e., concealing the presence of a message in order to keep it confidential) was also invented in ancient times. Herodotus provided an early example of concealing a message – a tattoo on a slave’s shaved head – beneath the regrown hair.

Modern instances of steganography include the use of invisible ink, microdots, and digital watermarks to conceal data.

1.2 Statement of the Problem

The issue is security. The password approach employed in almost all commercial operating systems is likely to be ineffective against a sophisticated or simple attacker. Those seeking to reduce unauthorised access to confidential files or data are likely to consider data encryption next.

Computer operating systems provide security using a pre-defined super user account and password. The super user may have multiple passwords, one for controlling network operations and another for performing or accessing nightly backups, creating accounts, and so on.

Logging on to a system as the super user may be the most effective technique for a cracker to collect data or cause damage. If the super user does not change an operating system’s preprogrammed passwords, the network is exposed to attack.

Most crackers know these passwords, and their first step in breaking into a network is to try them. If an attacker is unable to log in as the super user, the next best option may be to obtain the user name and password of an ordinary user.

It is usual practice in most universities and colleges, as well as in some commercial businesses, to provide each student or employee an account with a user name and an initial password, with the password being the user name.

Everyone was told to go on and change their passwords, but hackers and crackers frequently logged in before legal users could.

1.3 GOALS OF THE STUDY

a. To understand and improve computer data security by encrypting data.

b. To provide a method of protecting data in a system.

c. To promote data integrity.

d. To make it easier to use more sophisticated tools to prevent system hacking, cracking, and bugging.

e. Create a platform to complement physical security.

1.4 Significance of the Study

In today’s world, data security is essential. To keep your secrets secure, you may need to install safeguards that are not supplied by your computer operating system. The built-in safeguards may be adequate in some instances.

If no one attempts to break into or steal data from a certain computer, its contents will be safe. Alternatively, if the intruder has not learned how to circumvent the basic default mechanisms, they are sufficient.

However, many attackers have the knowledge and resources to compromise numerous security systems. If you opt to do nothing and hope that no competent cracker targets your data, you might be lucky and nothing awful will happen.

Data Encryption, one of the most critical tools for securing your data from unauthorised access, is one of several methods for converting readable information into gibberish.

Even if an attacker obtains the file’s contents, the results are gibberish. It makes no difference whether or not the operating system protections worked.

Need help with a related project topic or New topic? Send Us Your Topic 

DOWNLOAD THE COMPLETE PROJECT MATERIAL

Exit mobile version