Abdu Gusau Polytechnic Talata Mafara Zamfara State: Topic
Abdu Gusau Polytechnic Talata Mafara Zamfara State: Topic
ZAMFARA STATE
DEPARTMENT OF COMPUTER SCIENCE, SCHOOL OF SCIENCE AND TECHNOLOGY.
COMPILED BY
MUHAMMAD ABDULBASIT JUNIOR
1707231156
ABDULSAMAD MUSA
1707231155
TOPIC
DESIGN AND IMPLEMENTATION OF SECURITY MANAGEMENT
USING DATA ENCRYPTION AND DECRYPTION TECHNIQUE
OCTOBER 2019
1
INTRODUCTION
Digital security today has taken a new dimension, a new style and a strategic approach
which tends to secure data’s travelling across the globe through a public vehicle called
the internet. Data’s cannot be over-secured with the available threats that can turn to
reality, small or large, minor or important; there is a need to build a secure wall around
them (Ananda Mitra 2010). The traditional method most computer users use in
securing data’s is to lock them with applications, use passwords from programs like
Microsoft Word, Excel and PowerPoint. This method is same as no protection
especially when data contain useful details that need to be enclosed by two parties
such as pay slips, financial records, military data’s and more.
Data encryption is a useful form of doing this; it employs technique that locks out
information from any unauthorized user. Nowadays, data can be hijacked and cracked
with intense logic, exposure to facts and experience in M.I.S- management information
security as well. With this in view, there is need to do even more to ensure that
sensitive data is protected through its life-cycle. This will create a sense of security
and assurance that the transited information is locked-out to only authorized
personnel. However, the fact remains that any data that is exposed to a third-party
stand a chance to be compromised no matter how secure, it may only take some time.
This process may be attempted for so many reasons best known to the person.
Hacking has gained its ground in countries where MIS has stood very firm like USA,
England, Canada, India etc., most of our security systems are built by these same
professional hackers. Cyber-attack is also a way to gain access to personal, business
or government systems and compromise sensitive data’s which may not be protected
or lightly protected. Data’s sent over the internet are open to hijackers who can sniff
them from the network, our mailboxes, secured cloud storage systems etc. at little or
no cost.
Encryption has long been used by military and governments to facilitate secret
communication. It is now commonly used in protecting information within many kinds
of civilian systems. For example, the Computer Security Institute reported that in 2007,
71% of companies surveyed utilized encryption for some of their data in transit, and
53% utilized encryption for some of their data in storage. Encryption can be used to
protect data "at rest", such as information stored on computers and storage devices
2
(e.g. USB flash drives). In recent years there have been numerous reports of
confidential data such as customers' personal records being exposed through loss or
theft of laptops or backup drives. Encrypting such data at rest helps protect them
should physical security measures fail. Digital rights management systems, which
prevent unauthorized use or reproduction of copyrighted material and protect software
against reverse engineering (see also copy protection), is another somewhat different
example of using encryption on data at rest.
Weak security and encryption standards are found in data created by most
applications such as Microsoft Word, Excel, database data and special purpose
reports.
RESEARCH QUESTION
3
Can provisions of link between the data transfer by the two parties bridge the
gap between the parties?
Can Design and implementation of this software using cryptography secure
the data which is easily broken before?
This study uses a deep programming approach to bring life to the basics of this work
4
above to tackle the stated problems. Also it is built as a desktop application which will
run only on windows machine.
Some constraint identified in this research is the amount of time available to build the
software, availability of experienced MIS security personnel’s or hackers to fully try
their best on the output of the project. Searching information about computer security
through Data Encryption and another problem since the secrete key has to be sent to
the receiver of the encrypted data, it is hard to securely pass the key over the network
to the receiver.
LITERATURE REVIEW
Building of computer systems either large or small requires a proper focus into the
market for existing similar systems. This give you a guide on what to do, how to do it,
where to improve and what will make yours special than what already exist. Several
algorithms has been designed, same for programs which task is to handle security of
data, finance, data’s and other special functions. Bearing this in mind, the end product
is a function of existing algorithm and a new approach which differs from any product
of such. Using the Advanced Encryption Standard may be new to data security, in this
section, we dig deep into similar project works, research and software’s to enhance
the concept design.
Secure electronic data transfer between organizations has become essential for
business transactions and communication. Healthcare organizations are no exception
to this requirement. The ability to leverage the Internet to share protected health
information also known as PHI or other sensitive information between healthcare
organizations is ever increasing. From individual data encryption and VPN's (Virtual
Private Networks), to a complete EDI (Electronic Data Interchange) system, a plethora
of methods and applications exist for securing the transfer of data over the Internet.
This case study presents the implementation of secure data transfer using FTP over
SSL (data Transfer Protocol over Secure Sockets Layer) in a healthcare organization.
5
Before state, project requirements including risk assessment, reasoning behind
product selection, implementation, and technical information regarding FTP, SSL and
SSH (Secure Shell) will be presented. Satisfying HIPAA (Health Insurance Portability
and Accountability Act) requirements will also be touched on. Research and
consideration were given to several different methods for secure data transfer
including a complete EDI solution. Due to the specific project requirements of the
healthcare organization, the solution chosen was a highly customizable and scalable
product that uses FTP over SSL with the additional ability of data encryption.
However, the limitation was obvious since it can only secure image data’s and also if
the primary image is destroyed or deleted, same thing happens to the encrypted
image.
6
Key encryption in multi-user setting, security proofs and improvement; (Bellare,
M. 2000)
Cryptographic protocols are widely used for secure application-level data transport. A
cryptographic protocol usually incorporates at least some of these aspects:
7
integrated into their military and government computer systems to ensure that reports
and system generated data are always accessed by authorized personnel’s.
This new system is built on the Advanced Encryption Standard (Rijndael algorithm),
which is discussed earlier in this chapter.
8
Types of Security Management System
Security management is the identification of an organization’s assets include
(buildings, people machines and information assets), followed by the development,
documentation, and implementation of policies and procedures for protecting these
assets. The following are the types of security management systems:
CCTV
Access control
System integration
Structured cabling/data
Fire system
Home automation
Telecommunication
Audio
Industrial barriers and Gates
Alarm system
Automatic sliding door
Intercoms
9
Benefits of Security Management System
An information security management system (ISMS) is a set of policies, procedures,
processes and systems that manage information risks, such as cyber-attacks, hacks,
data leaks or theft. The following are the main benefits of information management
system.
Ability to market more: because more people in the industry want to work with
companies that protect data better, you would be able to market yourself quite
easily. There would always be potential clients you can approach and share
your USPs with. They would potentially never have to worry about data loss or
theft with a certification like this with their vendor.
Confidence of clients: having the confidence of your clients is of critical
importance in any field of business. The moment your clients know they have
the right vendor; they would renew your contracts with ease. Thus giving you
a higher retention of clientele.
Summary
Having developed and implemented data encryption software using the Advanced
encryption standard (Rijndael algorithm) and working in perfect condition as expected,
this chapter brings this research to a close by summarizing the undergone activities
and recommendations on how it can be made more standby and successful. Unlike
many encryption software, this one allows you to encrypt any type of data with any
size, it securely encrypts the data using any key of your choice or without any if you
choose to. With the Rijndael algorithm you are sure of a top level encryption at every
time, it is the Advanced Encryption Standard (AES) which is endorsed by NSA and
used across all top government and military systems in the USA.
In a nutshell, any data encrypted with this software can be decrypted by another
software developed in same fashion using the Rijndael algorithm but only when the
encryption key for the data is provided.
Conclusion
Data security will always be an important issue in business, government, military and
intelligence. As far data’s are properly secured, information can be transferred without
fear of intercepting the message. Software systems are being built and modified
periodically to make sure there is no mean of cracking the end product. Development
10
framework and language matter a lot in this sense which makes the Microsoft .NET
framework a very good option for developing this project. The success achieved in this
research work is attributed to the good standing and security measures of the Rijndael
algorithm (AES). This research work targets any type and size of data giving you an
output data based on your preferences.
Recommendations
Every software system has a potential to get better than its current version due to
changes in specifications, design patterns, logic and so on. To keep this end product
alive and the aims and objectives of design alive some recommendations are given
below;
i. The encrypted data from this software should be tested (by hackers) on a
regular basis for flaws that can make it exploitable, this will give room for
improvement
ii. Design specs should be updated based on suggestions and feedback from
users
iii. All encryption algorithm are open to the general public so people also try to
break the Rijndael algorithm, whenever there is a general fix, the software
should be modified as well
iv. To improve the software effectiveness certain features may be added in the
near future such as the ability to recover encrypted data’s when the key has
been forgotten.
11
REFERENCES
Avik, C., & Bruno, B. (2012).Automated Formal Analysis of a Protocol for Secure
data Sharing on Untrusted Storage.
Henri, G., & Thomas, P. (2009). Super-Sbox Cryptanalysis: Improved Attacks for
AES-like permutations
Joan, D., & Vincent, R. (2002). The Design of Rijndael: AES – The Advanced
Encryption Standard.
McWilliams, G. (2011). Hardware AES Showdown - VIA Padlock vs. Intel AES-NI vs.
AMD Hexacore.
12