Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

Project report on

Cyber café Security System

by

Names of students
C701 Sunder Ponnusamy Gounder

Semester - VII

Department of Computer Engineering


Vidya Prasarak Mandal’s
Maharshi Parshuram College of Engineering
Hedvi - Guhagar Road, At: Velneshwar
District: Ratnagiri, PIN: 415729
2019 - 2020
Certificate

This is to certify that the following students have satisfactorily completed project
dissertation - I work on Cyber café Security System submitted to University of
Mumbai in partial fulfillment of the Bachelor’s Degree in Computer Engineering
course of Semester VII.

Names of students

C701 Sunder Ponnusamy Gounder

------------------------------- -------------------------------
Mr.Avinash Pawar Mr. Ketan Kundiya

HOD Co-Guide

--------------------------

Prof. Amit Mane

Principal

iii
Vidya Prasarak Mandal’s,
Maharshi Parshuram College of Engineering
District: Ratnagiri, PIN - 415729

Department of Computer Engg.

Project Dissertation – I

Approval sheet

Project title “Cyber Cafe Security System”

Submitted by
C701 Sunder Ponnusamy Gounder

In partial fulfillment of the Degree of B.E. (Semester VII) in Computer during


Academic year 2019 – 2020 is approved.

------------------------------- ----------------------------
Mr. Avinash Pawar Mr. Ketan Kundiya

HOD Co-Guide

- --------------------------

Prof. Amit Mane

iv
Principal

Declaration

We declare that this written submission represents our ideas in our own words and
where others’ ideas or words have been included, we have adequately cited and
referenced the original sources. I also declare that we have adhered to all principles
of academic honesty and integrity and have not misrepresented or fabricated or
falsified any idea/data/fact/source in our submission. I understand that any violation
of the above will be a cause for disciplinary action by the Institute and can also evoke
penal action from the sources which have thus not been properly cited or from whom
proper permission has not been taken when needed.

Name of students Signature

1. C701 Sunder Ponnusamy Gounder

Date

v
Abstract

Cyber café Security System

A cyber cafe is business where computers are provided for accessing the internet or doing
other computer-related tasks. The access to the computer and internet is charged based on
time. Many people repeatedly need computer access for work like emails, online taxation
filing, project preparation etc. computer system for the CYBER CAFÉ that makes the
management of recording user details, internet usage and billing much easier Automation is
a need of time. The objective of this software is to maintain the details of users, cabins and
login history. Through this system we provide facility of prepaid and postpaid accounts
respectively for Account Users and Walk through Users. It has the features like adding,
viewing, editing of user details, cabin details, recharge option for prepaid users, billing, tariff
settings, etc.

Keywords- Socket Programming in JAVA, Administration and Client computer, database


storage

vi
Chapter: 1
Introduction

1.1 What is Socket Programming


Sockets provide the communication mechanism between two computers using TCP
(Transmission Control Protocol) . A client program creates a socket on its end of the
communication and attempts to connect that socket to a server.

When the connection is made, the server creates a socket object on its end of the
communication. The client and the server can now communicate by writing to and reading from
the socket. The java.net.Socket class represents a socket, and the java.net.Server Socket class
provides a mechanism for the server program to listen for clients and establish connections with
them.

1.2 Aim and objectives

The Objective and aim of my Cyber Cafe Security System to record the details various activities
of user. It will simplifies the task and reduce the paper work. During implementation every user
will be given appropriate training to suit needs. proposed system relates to data management and
data security system.To offer customers hi-speed internet access, stock maintenance and other
computer services. Provide centralized control system to administrator to monitor the user
activities. Proved system user friendly and free to installation (package).

1.3 Problem definition

[1] In current system, The main problem the café owner faces is that he has to manage the
whole café work manually, i.e. user's registration, login time, billing amount etc.
[2] Whenever a User goes to internet café, every time he has to show his identity.

[3] Existing software is highly cost and should be re-register every two to three years.

1
Chapter: 2
Literature Review

Summary of articles

Dr Isa Ali, May 2015 proposed Client/Server Interface Monitoring and Management System.
International Journal Research in Engineering & Management (IJREM) ISSN: 557, Volume-2
and the Author optimal solution for monitoring client/server system and to manage software in
cyber café.

Sanjay Kumar, and O P Wali, in IEEE Internet Computing INSPEC:167070( Volume: 21 ,


Issue: 2 , March 2017 and title on Internet cafes Security in India explains about, Given solution
in site blocking techniques and LAN security.

In IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-


8727Volume 12, Issue 2 (May. - Jun. 2013), PP 67-75 Cyber security is the activity of
protecting information and information systems (networks, computers, data bases, data center
and applications) with appropriate procedural and technological security measures. Firewalls,
antivirus software, and other technological solutions for safeguarding personal data and
computer networks are essential but not sufficient to ensure security. As our nation rapidly
building its cyber Infrastructure, it is equally important that we educate our population to work
properly with this infrastructure. Ethics, Safety, and Security issues need to be integrated in the
educational process beginning at an early age. Security counter measures help ensure the
confidentiality, availability, and integrity of information systems by preventing or mitigating
asset losses from Cyber security attacks.

2
Chapter: 3
Project Details

3.1 Principle of operation


The use of efficient and accurate time management techniques is very important for a system
that will provide good security to cyber. Recommended system are beneficial to both service
provider and users. For most people, cyber security is the same in meaning to information
security. This, however, is not true, as we will establish in this lesson. Cyber security is the
ability to protect or defend the use of cyberspace from cyber attacks. To better understand this
definition, we first need to understand what cyberspace and cyber attacks are.

Cyberspace is a global virtual environment, mostly on the internet, created by computer


systems. A cyber attack is an attempt to disrupt, disable, destroy or maliciously control a
computing system via cyberspace in order to destroy the integrity of data or steal access-
restricted information.
Therefore cyber security is about protection of sensitive information, specifically those stored or
accessed via the Internet, from cyber attack.

3.2 Applied methodology :

3
3.3 Theoretical analysis, design and development

3.3.1 Block diagram

Customer

Start
Adminserver
System Database
started

Send
request

Customer

4
Use Case Diagram :

5
Sequence Diagram :

6
Chapter: 4
Result and conclusion
Result

Conclusion

A click on a system will display the current status (vacant or occupied), the IP address of the
PC and additional information like the work duration on the system.

It help administrator to maintain user details and easy to search history.

System front end is java, hence it can be installed in any computer system.

System can run even the internet not available.

7
References

Aladelusu, B. (2008). "Types of Network" Ibadan, Press Ibadan. Pp 2-9.

Aresenault, A. & Houseley, R. (2000). Protection Profile for Certificate Issuing and Toronto.
Canada. Pp. 11-25.

Bishop, M. (2002). "Computer Security, Art and Science“ Pearson Education Inc. New York.
Pp. 11-31.

Antamedia HotSpot ANTAMEDIA NEBOJSINA,SERBIA

https://www.answers.com/ internet_cafe

https://www.google.com/

You might also like