ABSTRACT
Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance.
Due to unauthorized access to data in database, repose disclosure or modification will invade individual process, computers have been produced with an encipher and decipher package in various computer language like C++, paschal, Fortran, visual basic etc. voting modified from or RSA cipher encryption, the package is two keys are required. The two keys are public key and secret key respectively.
The project is aimed at developing a computer data security system using data, encryption know as cryptography to LEECOM FINANCE AND INVESTMENT LTD. it also takes a look at the present data security of LEECOM FINANCE AND INVESTMENT LTD, identifying the problems encountered in carrying out these process.
TABLE OF CONTENTS
Title Page
Certification
Dedication
Acknowledgement
Organization of work
Table of content
Abstract
CHAPTER ONE
1.1 INTRODUCTION
1.2 Background of the Study
1.3 Statement of the Problem
1.4 Purpose of Study
1.5 Importance of Significance of the Study
1.6 Scope and Delimitation
1.7 Limitation
1.8 Assumption
1.9 Definition of Term
CHAPTER TWO
2.1 LITERATURE REVIEW
CHAPTER THREE
3.1 Description and Analysis of the Existing System
3.2 Facts Findings Methods Used
3.3 Objectives of the Existing System
3.4 Organizational Structure
3.5 Input, Process and Output Analysis
3.6 Information Flow Diagram
3.7 Problem of the Existing System
3.8 Justification for the New System
CHAPTER FOUR
4.1 Design of the New System
4.2 Input Specification and Design
4.3 Output Specification and Design
4.4 File Design
4.5 Production Chart
4.6 System Flow Chart
4.7 System requirements
CHAPTER FIVE
IMPLEMENTATIONS
5.1 Program Design
5.2 Program Flow Chart
5.3 Pseudo Code
5.4 Source Program
5.5 Test Run
CHAPTER SIX
DOCUMENTATION
CHAPTER SEVEN
RECOMMENDATION AND CONCLUSION
7.1 Recommendation
7.2 Conclusion
REFERENCE