CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
The Internet has been described as the most revolutionary communication development of last century. It has changed everything about every type of business and there seems to be no end in sight to the advantages this phenomenon can bring to the enhancement of business communications. The Internet is a system for providing communication links between computers via local companies referred to as Internet of computer networks that is changing the way organizations and individuals communicates and do business. However, the major drawback is the security risks associated with it. The Internet suffers from a significant and widespread security problems. Perhaps, most important of all reason adduced for the poor security facilities on the internet may be the fact that it was not designed to every secured open access for the purpose of research was the prime motivation for the internet at the time of its conception. Other factors responsible for the security lapse of the internet are based on the TCP/IP (Transmission Control Protocol/Internet Protocol) suite of protocol. A number of TCP/IP (Transmission Control Protocol/ Internet Protocol) suites of protocols and a number of TCP/IP services are not secured and compromised by knowledgeable hackers. A number of security problems can be remedied or reduced through the use of this software and control for host security.
1.2 Statement of the problem
Some of the problems associated with the internet security are as a result of inherent vulnerabilities in the services (and the protocols that the services implement), while others are as a result of host configuration and access controls that are poorly implemented or too complex to administer. Additionally, the role and importance of system management is often short-changed in job description resulting in many administrators begin at best, part-time and poorly prepared. Furthermore, the unavailability of experts who will carry the jobs for the people. Also the cost at which people or individuals will undergo before acquiring one skill will also arise to be a problem.
1.3 Aim and Objectives of the Study
The main aim of this research is to develop an enhanced cyber café security system for newline computers Enugu.
The objectives of this Study are to develop a system that can;
- Investigate the system currently used for cyber café security.
- Determine the weakness of the existing system.
- Help implement the designed cyber café security system with modification of existing software and eliminating the entire weaknesses in the previous system.
1.4 Significance of the Study
Like any other application development the significance of this project is to make internet café business much more profitable and easier to the investors. An internet café without effective security will gradually die because of pester and cashier stall time spent by clients. This software is intended to stop the death of internet café’s with attendant unemployment in the space. This will be facilitated by the development of automated technique i.e. café billing to check time automatically. Application Development is when some weakness have been observed in system. The significance of this project is to analyze, observe, develop and eliminate all security loopholes noticed in Newline Computers Enugu. By so doing this will in term result into efficient and profitable cyber café business.
A cyber café business without efficient security system is dead on arrival. Security is one of the first and foremost considerations when setting up an Internet café. Cyber café is at security risk to intruders, viruses, operators of the systems and other unauthorized person. In cyber café visible assets of the business have been secured from theft by making sure that the environment is protected using all security measures like burglary proofs, CCTVs, Iron doors etc. the invisible assets of the cyber café like network provider, software and hardware systems have to be protected from hackers, pesters and viruses. Data which is a very vital assets to cyber café has to be protected, held in high esteem and handle with utmost care and confidentiality it requires. When a customer’s data gets into a wrong persons hand, this will make the customer to lose confidence in doing business with such Cyber Café, and it can also be very costly to the customers when information like ATM Number, Bank details, passwords etc. gets into a wrong hand. With the confirmation of various security measures, development of an automated billing system technique will be established to enable the investors/operators keep track of airtime used and who visited the Network at what time. Codes and passwords should be created when necessary for proper accountability and checks.
1.5 Scope of the Study
This project work or study is aimed at designing and developing an Internet Security System consisting of a time billing software for the Newline computers, Enugu. Furthermore, it is also aimed at saving the management of the Newline computers, Enugu, the troubles and difficulties in running an internet café manually.