Want better user experience? Login or Signup


Project topic for Computer Science department



1.1       Background of the Study

The ability to securely connect to virtual systems is an important element within a safe and supportive learning environment. This is particularly the case within higher institutions, where students are increasingly learning in digital formats; faculty, staff, and visitors are constantly accessing and sharing information online through the school portal; and more infrastructure and facility functions are being managed online. To maintain their collaborative culture, colleges and universities house robust information technology (IT) networks and multilayered infrastructure systems with varied levels of access and connectivity. Unfortunately, this open environment has made higher institutions around the world targets of cyber-attacks in 2017 two ransom ware attacks that reinforced the need for increased higher education cyber security planning, education, and training (U.S. Computer Emergency Readiness Team, 2017). Higher institutions are not new targets for malicious cyber actors and operations. Research shows that between 2005 and 2014, 562 data breaches were reported at 324 higher institutions, with doctoral institutions marking the majority (63 percent) of those reported (EDUCAUSE, 2014). When a higher institution is threatened by a cyber-attack or threat, the effect goes beyond loss of student and employee personally identifiable information.  Internet security is a wide and very important topic in our society communication system, but it is extremely dynamic and wide in scope. This is the reason that many companies and organizations invest heavily in a dedicated infrastructure security and highly trained specialists. Securing, monitoring and preventing the network from cyber threats require vigilance over the network equipment. According to studies by U.S. Chamber of Commerce, hacking, or gaining access into any computer system or network without the permission of the owner, is a leading cause of intrusions into a business’/ school information system. Hackers have a number of techniques at their disposal to take advantage of poorly protected records or credentials, but many intrusions exploit common weakness in an application or operating system software to gain unauthorized access. Some of the challenges faced at UNN ICT centre include electronic services, internet and electronic security, inconsistency in electricity supply. Strong administrative, physical and technical security measures are vital to ensure a safe ICT centre at University of Nigeria, Enugu Campus.

1.2       Statement of the Problem

There are a variety of general threats to a network and its infrastructure, such as through distributed denial of service attacks that may directly or indirectly target the institution’s network. Criminal and fraudulent threats target users in order to obtain personal data for identity fraud (Andrew C., Vincent W. 2005). There are also increasingly targeted attempts to obtain potentially sensitive data from organizations. This may include personal data of students or staff held by the institution or certain types of information, such as research, for commercial or political means.

1.3      Motivation

This project is an interest in taking up a challenging work in this particular area of research to test one’s confidence.

1.4       Aims and Objectives

This study aims at the design and implementation of an internet security package. The specific objectives are.

  • To design an internet security package.
  • To implement an internet security package.
  • To evaluate the internet security package.

1.5       Significance of the Study

This work will help in a good number of ways to monitor and secure the activities performed in the ICT centre. The software developed will help the ICT centre to achieve an efficient security system.

1.6       Project Report Organization

This study titled “design and implementation of an internet security package (A study of ICT centre University of Nigeria Enugu Campus)” is organized into five main chapters: Chapter one of this study is the Introduction. This chapter provides the background to the problem. Next is chapter two which is literature review. This chapter provides information on the basic concepts and related work on the subject matter.

Chapter Three contains the research methodology. This attempts to provide a detailed description of the phases and approach in the development of the study by providing an analysis of the existing system and a design of the proposed system.

Chapter Four captures the implementation of the proposed system design and states results gathered in the course of implementation.

Chapter Five which is the concluding chapter, includes the summary, conclusion and recommendation.

1.7       Definition of Terms

The following are some terms commonly used in this report.

  • Design: The art or process of deciding how something will look or work etc
  • Internet: The internet is a global system of interconnected computer networks that use the standard internet protocol suite (often called TCP/IP) to serve billions of its users worldwide
  • Web browser: A Web browser is a software program that interprets the coding language of the World Wide Web in graphic form, displaying the translation rather than the coding. This allows anyone to “browse the Web” by simple point and click navigation, bypassing the need to know commands used in software package/application.
  • Record: A record is a generic term of a row in database, just like a card. A record very often represents a piece of content.
  • System:A set of computer components i.e. in assembly of computer hardware, software and peripherals functioning together.
  • Password:This is a secret code that a user must type into a computer to enable He/She access its applications. This is made up of numbers, letters, characters or combination of any of the above categories.
  • Software:Software is a collection of programs with the documents required for it to perform its duties in a given environment.
  • Modules: This is an independent/self-contained program.
  • Database: A collection of interrelated data stored with controlled redundancy to serve one or more applications.
  • Email: The term electronic mail is used to describe various system of sending data or message electronically via the telephone network or other data network, through a central computer without the need to post letters.
  • Flowchart: This is the diagrammatic representation of the program components using standard symbols.
  • Hacking: A hacker is a person who attempts to invade the privacy of a system. Hackers are normally skilled programmers.
  • Hardware: This is the physical part of a computer system.
  • Methodology: A methodology is a collection of procedure techniques, tools and documentation aids which will help the system developer in their effort to implement a new information system.
  • Microsoft Visual Basic: This is the software which allows you to develop your own software.
  • Network Servers: These are devices used to manage how the various resources on the network are shared.
  • Offline: This is the process of the computer not connected to the internet.
  • Online: This is the direct connection to the computers through the internet.
  • Security: This is an act of safeguarding a file or a document in order to prevent unauthorized access.
  • WWW: This stands for world wide web which consists of the different websites which one can visit

To get the complete material - Download Here

Other topics you might be interested in: