You are on page 1of 6

OBJECTIVE

ABC is the institute which is offering Management as well as Technical courses (MBA, MCA, BBA). As the number of students are increasing every year, management feels that it will be difficult to manage and fulfill Management/Students Queries regarding Fee status, Internal Term Test Results, External Result, Library book status etc. Besides these different queries, students can also check about Campus Activities. Some current activities happening in the premises of institute that management cant explain to every student individually. And above all the marketing of any Institute at global level is possible only by a dynamic Website. Keeping in consideration to all the above problems, Management has decided to facilitate students queries through its own website xyz.com. ABC decided to assign an individual userid and password to each student. Student can login and can check his/her fee status, results etc. and can satisfy other queries related to the institute.

------------------------- xxxxxxxx ---------------------------

VALIDATION CHECKS Following are the validation checks implementedClient Side Validation Before submitting any Request Form, check that user has filled all the entries. Password re-entered by the user in the Sign Me Up form is correct or not. Server Side Validation To check whether the entered userid and password is correct or not. To check whether the rollno of a user who wish to create its userid is correct or not.

------------------------- xxxxxxxx ---------------------------

FUTURE SCOPE OF THE PROJECT

Any system has scope of improvements / amendments. In the future we can register our students online besides that students can be given some online tutorials to improve their knowledge level.

At present the website is hosted on the Server of MANTRAONLINE, in future it is planned to develop our own WebServer to host the website.

------------------------- xxxxxxxx ---------------------------

SECURITY MEASURES TAKEN

The system security problem can be divided into four related issues Security, Integrity, Privacy and Confidentiality. System Security refers to the technical innovations and procedures applied to the hardware and operating systems to protect against deliberate or accidental damage from a defined threat. In contrast, data security is the protection of data from loss, disclosure, modification, and destruction.

System Integrity refers to the proper functioning of hardware and programs, appropriate physical security, and safety against external threats such as eavesdropping and wire-tapping. In comparison, data integrity makes sure that data do not differ from their original form and have not been accidentally or intentionally disclosed, altered or destroyed.

Privacy defines the rights of the users or organizations to determine what information they are willing to share with or accept from others and how the organisation can be protected against unwelcome, unfair, or excessive dissemination of information about it.

Confidentiality is a special status given to sensitive information in a database to minimize the possible invasion of privacy. It is an attribute of information that characterizes its need for protection.

Control Measures After system security risks have been evaluated, the next step is to select the measures that are internal and external to the facility. The measures are generally classified under the following: Identification There are three schemes for identifying persons to the computer Something you know - such as password. A password is the most commonly used means for authenticating the identity of people. Passwords should be hard to guess and easy to remember. Something you are Such as fingerprints or voiceprints. Something you have Such as the credit card, key or special terminal. Access Control Various steps are taken to control access to a computer facility. One way is to use an encoded card system with a log-keeping capability. Encryption is and effective and practical way to safeguard data transmitted over an unprotected communications channel. Audit Controls It protects a system from external security breaches and internal fraud or embezzlement. The resources invested in audit controls, however, should balance with the sensitivity of the data being manipulated. One problem with audit controls is that it is difficult to prove their worth until the system has been violated or a company officer imprisoned. For this reason, audibility must be supported at all management levels and planned into every system.

System Integrity It is a line of defense that concentrates on the functioning of hardware, database and supportive software, physical security and operating procedures. The most costly software loss is program error. It is possible to eliminate such error through proper testing routines. Parallel runs should be implemented whenever possible. Physical security provides safeguards against the destruction of hardware, databases, and documentation- fire, flood, theft, sabotage, and eavesdropping, and loss of power through proper backup.

------------------------- xxxxxxxx ---------------------------

You might also like