The Hacking Notification On Mobile

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

ABSTRACT

As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage Media. Sensitive data may also be leaked accidentally due to improper security provided to system. To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data. Almost 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends of mobility. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have authorized access to the organization’s network and servers. Theft of confidential information is often for either material gain or for willful damage. As more and more information is stored on our computers and passed back and forth from person to person, digital document and file security presents new challenges for home and corporate computer users, with fear of data breaches, identity theft, and loss of sensitive information. It's equally important for shared documents (both paper and electronic) that contain personal or financial information before discarding them. Even after thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to set up and a nuisance to run, so people judge from experience how little of it they can get away with. Since there’s been little damage, people decide that they don’t need much security. In addition, setting it up is so complicated that it’s hardly ever done right. While we await a catastrophe, simpler setup is the most important step toward better security. In a distributed system with no central management like the Internet, security requires a clear story about who is trusted for each step in establishing it, and why. Therefore our article further summarizes and compares existing methods of providing confidential storage and providing security to personal data.

KEYWORDS

Personal Data Security, Hacking Alert, GSM (Global System Communication) kit, Credentials, Unauthorized access, authorize person, intruder, Mobile Notification,

INTRODUCTION

In present world, information has become very important Commodity, which needs to be protected at all cost. Especially information related to business and military is top most important. Information leakage related to such institutes can play havoc to their financial results also. Now along with securing information it is even important to share information with other people as and when required. To store and share information easily, computer with phone and net connection has become a choice of public instead of sorting and sharing it on paper. Storing and sharing information on Computer with internet is cheap, easy and fast.

But, when information is stored in computer, we can cannot lock it in well secured storage room with lock and key, so anybody with enough knowledge of computer can try to Hack the computer and steal the most important and valuable information.

In our project we have tried to implement a feature such that whenever such a computer hacking attempts made owner is immediately made aware of such an attempt and computer is switched off to fail such an attempt.

LITERATURE SURVEY

Author Sarah M Diesburg[1] explains that the general concept of secure handling of data is composed of three aspects: confidentiality, integrity, and availability. Confidentiality involve, ensuring that information is not read by unauthorized persons. Using encryption to store data or authenticating valid users are example means by which confidentiality is achieved. Integrity ensures that the information is not altered by unauthorized persons. Combining a message authentication code with sensitive data is a way to verify integrity. Finally, availability ensures that data is accessible when needed. As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage media. Sensitive data may also be leaked accidentally due to improper disposal or resale of storage media. To protect the secrecy of the entire data lifetime, we must have confidential ways to store and delete data. We here summarizes and compares existing methods of providing confidential storage and of data in personal computing environments. Security of confidential data is of utmost importance. Most student and employee information is confidential. We have to be cautious with any private data, and have to store as little on your computer or in unlocked areas as possible. Information kept on your computer can be accessed by someone using your computer or hacking into it from the outside. When the security of personal information is believed to be breached, hundreds of hours of both user and computer expert are involved in investigating and repairing the breach and notifying those affected. You are responsible for the material that you store, send, or display.

PROBLEM DEFINITION

Now days security is the most probable concern in every sector that deals with sensible data, whether if either be business, financial, personal or may be any government organization. Most of the data stored in the computers are usually accessible to all users who are authenticated to use

the system. It provides no way to keep track of how and when the sensible data was accessed/modified by an unauthenticated person. As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic storage media. Sensitive data may also be leaked accidentally due to improper security provided to system.

The project deals with the protection of sensitive data as well as smart monitoring through web cam device that will be very much helpful for keeping a visual record of the user trying to access the data no authorization, as a collection of the bitmap files with additional information of how many times wrong password was entered. Additionally we are go into make provision that allows us send signals to a remote device like mobile during an unauthorized attempt of accessing the Computer/Data. Also we are making to force the system to be shut down after a finite predefined number of failed Access attempts.

PROBLEM SOLUTION

When computer is locked by password and when any unauthorized person tries to open the computer by inserting the wrong password once, the PC automatically calls owner through telephone line and giving security breech message.

SYSTEM DESIGN

System Architecture

It is a security based software providing security to files and folders on client machine; it is designed taking client-server architecture in consideration. It comprises of following modules:

Client Side module: This module provides user to secure his files and folders, by providing a password and encryption mechanism. The authorized user sets an password and enters the mobile number details where the notification message is to be sent. The Admin is the authorized user which sets password and provide encryption. The intruder is another user at Client machine which tries to access data by trying to crack password by guessing and entering it.

Server Side module: This module provides a facility for authorized user to set his password and mobile number in the database at the server. The server is connected to the GSM module further which on receiving any notification from client machine of intruder activity further triggers the GSM kit to send a notification to the user mobile number registered at the server database. The server holds a database which stores the admin i.e. system owners mobile number, image of intruder captured by webcam.

GSM module: The primary appeal of the GSM network for industrial applications the GSM Network is inherently digital which makes it secure, relatively error-free, and jamming-proof. GSM technology allows for a roaming system, wherein both transmitter and receiver can be move around the cellular network. This module works as mobile message sender and sends a notification to the authorized user’s mobile phone that his system is in danger; it is a module for hardware kit called GSM Kit connected to server and is triggered by server for sending notification to user on detecting a intruders activity at client machine.

Client Computer System:

These are the Client Systems which are connected to the server System.

System:

All important files and folders are stored in the hard disk. The important files are stored in the folder and the folder is made secured by the software. It holds two layer of protection, firstly the folders are encrypted and password security is provided to these folders.

Database:-

Our application database holds the information like filename, password and mobile number of the authorized user in the system.

GSM:-

When a GSM modem is connected to a computer, this allows the computer to use the GSM modem to communicate over the mobile network. While these GSM modems are most. frequently used to provide mobile internet connectivity, many of them can also be used for

sending and receiving SMS and MMS messages when a hacker (c1) is trying to access the folder he has to enter a password and on the third wrong attempt of password, image of hacker will be captured and notification will be given on mobile phone of authorized person.

APPLICATION

The software holds a wide range of applications in industry as follows:

The software has a major application in IT companies where the data is very confidential and needs to be protected at any cost, it monitors, controls the integrity and confidentiality of data.

The software also holds a major application in military services where data like Defense strategies are stored in large amount in officer’s personal computers and office LAN computers.

The software can be deployed for bank websites where the net banking transactions take place, so any intruder trying making an access to such sensitive areas is highlighted and caught.

The software also holds an application in future scope in ATM machines where hackers always have an target to attain an easy cash, here the notification and web cam capturing mechanism will be of most use.

ADVANTAGES

The project focuses on providing security to the data in personal computers. It focuses on maintaining the integrity and confidentiality of data in computers by providing multilayer security.

Following are some of the advantages of Hacking notification on mobile phones:

Data can be kept secured at desktop computers

Personnel computers are mostly prone to hacking and data acquisition by intruders or regular users of computers, thus many a times the data confidentiality gets lost, but this software overcomes this problem and secures data.

Intruder’s image gets captured and the suspect gets snapped

Though today many software’s have come up with the concept of stopping hacking by providing multilayer security, but in these cases though the hacking gets restricted but the hacker gets away with it without getting caught, but in our project this concept of capturing image of the intruder without the intruder being notified helps in catching him and stopping further hacking practices.

Authorized user gets notified for unusual activity detected at user’s machine

There are hacking software’s existing which stop hacking by providing a layer of security, but if someone is trying to get access to certain machine then the actual user never gets notified for it, but our software provides this facility of providing user a notification that the system is in danger and unusual trespassing activity is being conducted or tried at the users machine.

Data Encryption provides a third level data security

It happens that an intruder may get successful in cracking a certain password Barrier and get access to the user’s machine but this is also considered and overcome in designing our software, here we provide an encryption of data and so though an intruder passes the Password layer but cannot view the data since it is encrypted. Therefore a multilayer security still sustains. Therefore these advantages make the software very important and required facility in all personal computers. In present world a data costs for a company in millions and if for military uses the data can be an entire defense mechanism for country, any kind of data loss in any type of service is not affordable and so installing software like this will always be beneficial.

CONCLUSION

We have understood the design of the software to be developed and the software and hardware specification to be used have been studied. We conclude that the design report clears the complete idea of the software that will be developed and the development part can be started. We conclude that the present data security software are only restricted to providing password security and which only provides a single layer security to the confidential data, to overcome this

Problem we are building a data security software which provide a password security also the data keeps encrypted and the user get notifies via an message on his mobile phone over the system being accessed by the intruder.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now