(+234)906 6787 765     |      prince@gmail.com

DESIGN AND IMPLEMENTATION OF ENCRYPTED DATABASE SYSTEM

1-5 Chapters
Library / Doctrinal
NGN 4000

 INTRODUCTION: Historically, ensuring security mostly involved employing rudimentary measures such as securing physical access through door locks or safeguarding sensitive documents within secured filing cabinets or safes. In contemporary times, paper has ceased to be the exclusive medium for storing and disseminating information. Files are stored in both computer databases and physical file cabinets. Hard disc drives and floppy discs serve as repositories for a significant amount of our confidential data.

In the realm of physicality, the concept of security can be considered quite straightforward. A property can be considered secure if the locks on its doors and windows are sufficiently robust to prevent unauthorised access and theft of its contents. In order to enhance security measures against unauthorised access, the implementation of security alarms may be considered. In a comparable scenario, in the event that an individual attempts to illicitly take funds from your bank account, the teller's request for identification and scepticism towards the thief's narrative ensures the safeguarding of your monetary assets. When individuals enter into a contractual agreement, the act of affixing their signatures serves as the legally binding mechanism that compels both parties to fulfil their respective obligations.

In the realm of digital technology, security operates in a comparable manner. One fundamental notion is that of privacy, which is the prevention of unauthorised access to personal files containing sensitive information, such as medical records, or the unauthorised acquisition of financial resources by means such as collecting credit card numbers or online brokerage account details. Privacy can be conceptualised as a metaphorical lock that safeguards personal information and restricts unauthorised access. Data integrity is a conceptual framework that pertains to the identification of any modifications made to a given entity. The sound indicates the activation of an alarm system. Through the use of authentication protocols, it becomes possible to validate and confirm the identities of individuals or entities. This requirement is analogous to the identification needed for the purpose of withdrawing funds from a bank account or engaging in a transaction with an internet broker. Lastly, non-repudiation serves as a legal imperative that compels individuals to uphold their commitments.

With the increasing ubiquity of the Internet in everyday activities, the importance of ensuring electronic security becomes increasingly paramount. It is imperative for any organisation involved in online operations to evaluate and effectively handle the electronic security threats that are inherent to such activities. The utilisation of cryptographic techniques plays a central role in numerous risk-management measures. Cryptography is often regarded as the foremost security tool.