Professional Documents
Culture Documents
Chapter 1 4 Final 1
Chapter 1 4 Final 1
ICCT Colleges
in Information Technology
By:
Damascus D. Padilla
Eduardo G. Pereña
Sherwin Gomez
Ren Vincent P. Sy
Xyra Senopera
April 2024
ACKNOWLEDGEMENT
First and foremost, the researchers would like to extend heartfelt gratitude to
those who contributed the development of the Secure File Management and Access
The researchers, would like to express the deepest gratitude to Mr. Jerico
The researchers, would like to thank the faculty and staff members of ICCT
CAINTA MAIN CAMPUS for their cooperation and assistance, which helped shape
The researchers are grateful for the advice that has been given for each
individual, for their constructive feedback during the implementation phase of the
project.
Lastly, the researchers would like to acknowledge the unwavering support for
their family, whose patience and understanding were instrumental in the success of
this project.
II
APPROVAL SHEET
This capstone entitled “Secure File Management and Access System for School
Faculty via Local”, prepared and submitted by Xyra Senepera, Lean Angela T.
Recaña, Damascus D. Padilla, Jan Randell R. Caindoy, Angelo Louis R. Arquiza,
Clarence William Dino, Eduardo G. Pereña, Joe Edsel N. Nañoz, Sherwin
Gomez, Renz Vincent P. Sy, in partial fulfillment of the requirements for the degree
of BSIT, Capstone Project and Research 1, has been examined and is recommended
for acceptance and approval
JERICO M. VILOG
Adviser
APPROVED BY
III
ABSTRACT
principals' opinions of management information systems and how these systems are
ensuring a more efficient and quick working environment in schools. Because most
softcopy papers, managing these documents in a safe and secure manner has become
imperative for most organizations. In order to address the shortcomings of the current
A file management system is a suitable tool for use in schools for both storage
and access. It should be safe and easy to use for a variety of users, depending on how
experienced they are with file management systems. The main function of the system
is to give groups of users shared access, which entails having a shared storage where
users can download and upload files. This can give users access to multiple devices up
to the network's maximum capacity. For a space like a faculty room, this is sufficient.
Rather than transferring information via a flash drive or USB stick, groups of teachers
within the faculty can share files more easily by using File Sharing and Sharing
(FMS).
A local network that is reachable via a browser will be used to set up the file
management system. It will have user authentication on its web interface. To the
current system used by the school, this will be the primary addition. Users may
interact and access files in a secure, user-friendly environment with peace of mind,
thanks to its ease and security features. The user’s name and password that they may
have received from the administrator must be entered each time they want to access
the system. In order to avoid having to constantly log back in, they will have ample
time before being automatically logged out of the system. To give each teacher a
unique identification within the system, the individual accounts will also be useful. A
quick illustration would be that when a file is uploaded, the uploader's name which is
the name associated with their account is included in the file information.
IV
TABLE OF CONTENTS
Title Page……………………………………………………………………………I
Cover Page………………………………………………………………………….I
Acknowledgement………………………………………………………………...II
Approval Sheet…………………………………………………………………….III
Abstract………………………………………………………………………….….IV
Table of Contents…………………………………………………………………..V
CHAPTER 1: INTRODUCTION…………………………………………………….1
Hardware…………………………………………………………………………….7
Software………………………………………………………………………………8
Definition of Terms………………………………………………………………..38
Methods of Research……………………………………………………………...43
Sources of Data………………………………………………………………….…44
BIBLIOGRAPY……………………………………………………………………...45
APPENDIXES……………………………………………………………………….49
Researchers Profile…………………………………………………………..…...49
Curriculum Vitae…………………………………………………………………..50
CHAPTER 1
INTRODUCTION
volumes of documentation. The systems for managing the personnel files, financial
records, student records, education compliance documentation, and other forms that
these educational organizations handle are inefficient because they are mostly kept on
paper. One of these educational institutions' top priorities is to ensure that these
private records are safe and easily accessible. There are security dangers associated
is that there are still systems which are not correctly setup and are unsecured which
leads to the system having vulnerabilities and at risk of the files being taken by an
unauthorized user who have managed to get in the network. Some schools instead of
using file management system they rely on third party services such as a cloud storage
to manage their files. This is another risk for data breach the reason is that in case one
The current file management system for faculty at ICCT Colleges lacks secure
access control from the login system up to which users can only access which specific
files. The problem with this setup is that when the attacker gains access to the network
he will automatically gain access to the files that is present in that network. The
current school’s file management system also lacks an option for faculty teachers to
collaborate on a file which involves the file management system’s own user interface
volumes of documentation. The systems for managing the personnel files, financial
records, student records, education compliance documentation, and other forms that
these educational organizations handle are inefficient because they are mostly kept on
paper. One of these educational institutions' top priorities is to ensure that these
private records are safe and easily accessible. There are security dangers associated
File management systems are widely used by many schools. But the problem
is that there are still systems which are not correctly setup and are unsecured which
leads to the system having vulnerabilities and at risk of the files being taken by an
unauthorized user who have managed to get in the network. Some schools instead of
using file management system they rely on third party services such as a cloud storage
to manage their files. This is another risk for data breach the reason is that in case one
The current file management system for faculty at ICCT Colleges lacks secure
access control from the login system up to which users can only access which specific
files. The problem with this setup is that when the attacker gains access to the network
he will automatically gain access to the files that is present in that network. The
current school’s file management system also lacks an option for faculty teachers to
collaborate on a file which involves the file management system’s own user interface
Education providers now have a powerful tool to arrange and streamline information
sharing so that teaching and administrative staff may easily and securely access
papers. Furthermore, because the papers are centrally managed and safely saved in a
store hard copies and is very cumbersome to locate critical files, the file management
1. What are the potential disadvantage that using the system might result in?
2. What are the implications of unauthorized access or breaches in the current file
3. How effectively does the current system ensure the confidently, integrity, and
4. Is there enough security built into the faculty file management and access system in
enhancing the protection of the system and other facilities. The implementation of
securing the file management is to control system holds several specific benefits for
the following.
preparation easier.
The scope of this study computer system that facilitates effective document
organization, archiving, and retrieval. It saves time spent looking for certain files or
documents and does away with the requirement for actual storage spaces. With file
management solutions, educators can create electronic files that are centrally hosted
and securely saved, thereby controlling the creation and access to all types of papers.
A digital file in a file management system can only be read or altered by a person who
educational institutions may keep track of, access, and manage all electronic
documents. Access to this study will be restricted to faculty members and staff only;
students and unauthorized users who attempt to access it will not be permitted.
CHAPTER 2: TECHNICAL BACKGROUND
Hardware
Setting up a Secure File Management and Access System via Local Server for
Server: The file management system must be hosted on a reliable server. Processor
power, memory, and storage capacity should be sufficient to handle the expected
and antivirus software installed. Regular tests and audits should be carried out to
identify any potential security risks. Furthermore, the network should be regularly
Storage Devices: Storage devices such as hard drives or solid-state drives (SSDs) are
required to store the files and data managed by the system. The storage capacity
Backup Systems: Implementing a backup solution is crucial to prevent data loss due
to hardware failures or accidental deletions. Backup systems can include external hard
systems, and antivirus software should be in place to protect the server and network
Software
Secure File Management and Access System for School Faculty via Local
Operating System: Web Server: Ensure that the server runs a stable, secure
operating system. As well as Linux distributions like Ubuntu Server, CentOS, and
authentication data, file metadata, and access control information. There are several
DBMS options available for web applications, such as MySQL, PostgreSQL, and
SQLite.
File Management System: The core component of the system is the file management
software itself. This software should provide features such as user authentication, file
frameworks such as Django (Python), Ruby on Rails (Ruby), or Laravel (PHP) offers
a structured approach.
Security Tools: Companies should also invest in security training for their employees
to ensure they are aware of the latest threats and best practices. Regularly assessing
and auditing the security of the organization's systems should also be done. Finally,
businesses should have an incident response plan in place to quickly identify and
Monitoring and Logging Tools: Setting up monitoring and logging tools involves
several steps. First, choose the appropriate tool based on your system requirements
and budget. Next, install and configure the tool on your server or cloud platform.
Then, define the metrics and events you want to monitor and set up alerts for critical
issues. Finally, regularly review and analyze the logs and metrics to identify patterns,
backups of the system data and files. Backup software should support features like
both a process and a series of activities that involve the entire campus”
forecasting trends that will affect higher education and utilizing research to
plan for the future (Dennis,1998). Second, Dennis lists the following
attributes of those who understand enrollment management. Hossler and
Bean conclude that there are two goals of enrollment management. “First,
to exert more control over the characteristics of the student body and two
control the size of the student body” (& Bean, 1990, p.5) Given these two
with the attraction and retention of students (Braxton, Vesper, & Hossler,
the characteristics and the size of enrolled student bodies by directing the
affairs areas” (Dennis, 1998). Tinto and Russo (1994) report that the
must have to fill up first using ball pen and an enrollment form sheet given
they have developed different system about the registration and enrollment
that helps the school for having an easier process of managing student
information.
b. Review of Local Studies
This study aims to make use of numerous forms of records that are
records into digital copies these records can solve the current problem of
the government agency of having a hard time retrieving and keeping track
of their record’s whereabouts. They can also use the records to identify
problems by analyzing the data collected and to forecast what will be their
which the python library recognizes it. This library is tested as it is the
capable server of safely storing the data through Django and MySQL
(Jayoma,Moyon&Morales, 2020).
For decades researchers have discussed and debated the lower levels of
students. This achievement gap exists in all school ages. Even when
(Nettles, 2003, p.215). There is an endless list of possible reasons for this
“acting white”; lower teacher expectations, and the quantity and quality of
olds can read and gather information from a specialized text (such as a
Americans are only half as likely to earn a bachelor’s degree by the age of
management systems like Google Drive and One Drive where personal
files of users is stored on their servers which yields the possibility of data
being leaked. Another is the limited storage space and download speed
The system is designed for both individual users and organizations that
may require their own storage solutions. They named the system as
FileWallet system because of each users having their own storage like a
wallet where they can share through peer-to-peer (P2P) networks for
the security of the file the owner has full control on the access permission
3. Definition of Terms