Professional Documents
Culture Documents
HJYJTF Organized
HJYJTF Organized
Page 1 of
13
JAWAHAR NAVODAYA VIDYALAYA
EAST GODAVARI-1(DT.)
CERTIFICATE
This is to certify that the project work
“DATA SECURITY AND MANAGEMENT”
IS THE BONAFIDE WORK BY
NAME: Y V V S NAGA GANESH
HT NO:
IN THE DEPARTMENT OF COMPUTER SCIENCE, JAWAHAR
NAVODAYA VIDYALAYA, PEDDAPURAM, EAST GODAVARI_1
SUBMITTED IN PARTIAL FULFILLMENT OF THE
REQUIREMENT OF AS PER THE CIRCULUM OF THE XII
LEVEL DURING THE YEAR 2022-2023
PRINCIPAL
Page 2 of
13
TABLE OF CONTENTS
1. ACKNOWLEDGEMENT 4
2. INTRODUCTION 5
3. NECESSITY OF THE PROJECT 7
6. SOURCE-CODE 9
7. OUTPUT 11
8. BIBILOGRAPHY 13
Page 3 of
13
ACKNOWLEDGEMENT
It is with pleasure that I acknowledge my sincere
gratitude to our teacher, K. SRIDEVI (PGT IT) who
taught and undertook the responsibility of teaching the
subject computer science. I have been greatly benefited
from his classes.
I am especially indebted to our Principal K.RAMIREDDY
sir who has always been a source of encouragement and
support and without whose inspiration this project would
not have been a successful I would like to place on record
heartfelt thanks to him.
Finally, I would like to express my sincere appreciation
for all the other students for my batch their friendship &
the fine times that we all shared together.
Page 4 of
13
INTRODUCTION
DATA BREACH:
Page 6 of 13
NECESSITY OF THE PROJECT:
There is no foolproof method of protecting your company or data from
any of the types of data breaches mentioned previously. You can educate
yourself and your employees on the consequences of data breaches and
how likely it is for someone to hack into the system.
You can also ensure that your employees change their passwords
regularly by setting time-outs and timers on passwords. You can also
remind your employees to keep sensitive information they may carry with
them outside of work as safe as possible.
Page 7 of 13
PROJECT :
DATA ENCRYPTION AND DECRYPTION:
* Storing the data in a better way that is to make data not readable for
anyone until it was given some set of separate commands or through any
trusted process assigned by the programmer ALSO CALLED DATA
ENCRPTION AND DECRYPTION
Page 8 of 13
SOURCE CODE:
:
Page 9 of 13
Page 10 of
13
OUTPUT:
⮚
EXECUTION OF THE PROGRAM:
Page 11 of 13
Page 12 of 13
BIBLIOGRAPHY
Books
WEBSITES
● ladderpython.com
w3schools.com
Page 13 of 13