Advance Programming in Java Project: Security Reporting System

Verified

Added on  2025/05/04

|27
|3822
|118
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
ADVANCE PROGRAMMING IN JAVA
– PROJECT PROGRESS REPORT
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Letter of transmission
Date
Address
Dear Sir/ Ma'am
I announce the submission of the project work done by me by the name of the "Security
reporting System". The project made here is for explaining the concepts of cybersecurity and
their implications. The project work will display the advanced systems that can be used for
the purpose of providing the security and how these systems can be developed in JAVA.
Yours Sincerely
Name
2
Document Page
Executive summary
The system is totally based on the JAVA programming language which consists of the
different types of object-oriented programming concepts such as inheritance, polymorphism,
abstraction, encapsulation and abstract window toolkit. The JAVA programming concepts
leads to the development of the more effective and efficient security system. The security
reporting system consists of the JDBC Java Database Connectivity for the database
connectivity in order to store the data which consists of the different emerged threats in the
system. This report includes the different diagrams for illustrating the application.
3
Document Page
Table of Contents
LETTER OF TRANSMISSION...........................................................................................................2
EXECUTIVE SUMMARY...................................................................................................................3
PROPOSAL............................................................................................................................................6
ABSTRACT............................................................................................................................................6
INTRODUCTION.................................................................................................................................6
MOTIVATION......................................................................................................................................6
SYSTEM STRUCTURES.....................................................................................................................6
FUNCTIONS..........................................................................................................................................6
USER REQUIREMENTS.....................................................................................................................6
ADDITIONAL FEATURES.................................................................................................................6
INHERENT COMPLEXITIES AND CHALLENGES.....................................................................7
PROJECT PLAN...................................................................................................................................7
CONCLUSION......................................................................................................................................7
INTRODUCTION:................................................................................................................................8
SYSTEM ARCHITECTURE:..............................................................................................................8
INTERFACE SCREEN:.....................................................................................................................11
BACKGROUND AND MOTIVATION:...........................................................................................13
CLASSES:............................................................................................................................................15
FEATURES:.........................................................................................................................................17
LESSON AND EXPERIENCE:.........................................................................................................19
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RECOMMENDATION:.....................................................................................................................21
CONCLUSION:...................................................................................................................................22
REFERENCES:...................................................................................................................................23
APPENDIX...........................................................................................................................................24
Table of Figures:
Figure 1: System Architecture...................................................................................................9
Figure 2:Home screen..............................................................................................................11
Figure 3:Submission Screen.....................................................................................................12
Figure 4: Threat report screen..................................................................................................13
Figure 5:Security measures......................................................................................................13
Figure 6: Class Diagram..........................................................................................................15
Figure 7: architectural diagram................................................................................................24
Figure 8: Class Diagram..........................................................................................................24
Figure 9:Home screen..............................................................................................................25
Figure 10:Submission Screen...................................................................................................26
5
Document Page
Proposal
Security Reporting System for an Organisation-PROJECT PROPOSAL
Abstract
The Security Reporting System will be a software that will provide ease to write security
reports for an organization. While writing report the system will be capable to detect any
threat in the network and will provide suitable measure to stop the effect of the threat. The
developed system will be capable of testing short – medium length of program codes to
analyze and find out any vulnerability in it. This will provide an easy to use security system
that will guide, detect, solve any security threat to the organization.
Introduction
The developed system will provide a mechanism to fight from network attacks that can harm
organization resource at a very high level. Security is one of the most considerable aspect of
any organization. This system will provide solution to multiple domains of organization
security. This project will generate security policy after analyzing the organization structure
and other details. The system will generate timely report to secure computer network. The
system will also provide vulnerability check to the programs that were developed for the
organization.
Motivation
The main motivation for implementing this Project is to reduce the efforts made by an
organisation to generate threat report, finding threats in the network using only a single
software that provides various security related services for an organisation. (Amsler, 2016).
System structures
Hardware requirements CPU i5 7th Gen, Harddisk 180 GB, RAM 1 Gb
or more
Software requirements Java, NetBeans 8.0, MySQL
Functions
The project will help organization to manage security task such as:
a. Generation of Report and the security policies.
b. Threat reports can also be downloaded with the help of organization’s name and the type
of threat.
c. It will find the threat with their type, name, severity and the impact on the network.
d. Detecting vulnerabilities in network or any program source code.
User requirements
User requirements
Windows 7, Windows 8 or Windows 10 and the
SQLite database is used to store and retrieve
data.
Additional features
a. The project will allow to access its services after an organisation registration and login to
the system.
b. The threat reports were also be downloaded with the help of organization’s name and the
type of threat.
6
Document Page
c. The system will allow organisation to enter their details to generate an effective security
policy.
Inherent complexities and challenges
Inherit Complexities is to design Graphical User Interface for the Project named “Security
Reporting System for an organisation” where the merging and setting up of collaboration of
various services will become challenging task, also the JDBMS connectivity is the challenge.
Project Plan
The given table contains the whole scenario of Planning:
Items Activity Date Range Activities
1. 25 Feb 2019 to 5 March 2019 Research is to be done.
2. 5 March 2019 to 8 March 2019 Preparation for the Project Proposal
2. 9 March 2019 – 20 March 2019 Finding out the Requirements and
gather all the materials software to
implement the Practical.
3. 21 March 2019 – 30 March 2019 Implementation of the Project code,
Report of the project.
4. 01 April 2019– 05 April 2019 Preparing the Progress Presentation
Report and submit on 29th April.
Conclusion
The Conclusion part includes the parts covered in the above-made proposal. The Project
made has the main aim of reducing the problems or time-consumption faced by an
organisation to identify and prepare report and security policy reduce risk from cyber threats.
The application would include the Graphical User Interface as well as the JDBMS
connectivity.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction:
In this assessment the security management system has been developed by the user for the
management of the system security. If there is any type of threat in the system of the
particular organization the system reports the threat in order to detect the different threats
which are presented in the system of an organization. The security reporting system is the
system which consists of the different features which are used to report the security issues
presented in the system of a company to make them aware about the different security threats
in order to keep their system at the safer side from the emerging threats.
System Architecture:
The system architecture is the working process of any system in order to show the working of
the particular system to the users so that they might get the complete knowledge about the
working of the system and each and every component of the system. The system architecture
is the blueprint of the particular system which consists of the functionality details of it. The
system architecture describes the system’s functionality in order to show the proper working
of the system to its users.
The system architecture is the structured diagram of the particular system which demonstrates
the functionality details and the different components which are used in the proper
functioning of the system in order to perform the desired tasks more effectively and
efficiently. The structured description of the system is given in the system architecture of the
security reporting system.
The system architecture represents the working procedure of the software in order to perform
the different tasks using the particular system. The system architecture states the overall
functioning of the particular system in order to perform the different tasks.
8
Document Page
Figure 1: System Architecture
9
Document Page
The Different components used in the Security Reporting System are as follows:
1. Firewall: the firewall is used in the software for the protection from the different types
of threats in order to secure the system from the different threats emerged from the
different sources in order to perform the tasks more effectively and efficiently without
any problem.
2. Internet: the internet source is used to run the application in order to perform a
particular task. The internet is the source for an application for its execution and
functionality in order to perform the desired tasks. It consists of the world wide web.
3. Server: server is a particular object used to respond the requests of the clients in order
to provide them the particular sources which are needed by them. The server gets the
request from the client and response their request and provide them the access
permissions for loading the page on the system.
4. Administrator: the administrator of the system is the person who manages the overall
system in order to perform the different tasks. The admin also provides the access
permissions to the users in order to provide them the application access for their
usability.
5. Database: the database is the backend of any system which stores the different types
of data in order to perform the different tasks. The data can be stored by the users in
the backend of the system which is named as the database of the system.
6. Users: the users are the persons who need the application to perform the desired tasks.
the users are the persons who are provided the access rights of the application by the
administrator in order to perform the different tasks.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Interface Screen:
The interface screen is the screen which provides the particular view of the application to the
users. There are the different interface screens in the security reporting system in order to
make the people of an organisation aware about the different emerging threats to the
application in order to keep their system at the safer side. The interface screen provides the
working framework of the system in order to perform the different functions. The system
performs the different functions in order to get the desired results.
The different screens used in this system are home screen, interface screen, threat screen,
threat removing screen and solution screen. These screens used to perform the different types
of tasks which are related to each other. The interface provides the user interface to the users
of the particular application.
1. The home screen: the home page of the software is the front page which consists of
the login button used for logging in the user. The home page provides the login link to
the user by which they can be redirected to the login page.
Figure 2:Home screen
11
Document Page
2. Submission page: the submission page consists of the input code for the system the
user needs to input the code in order to submit that code from the detection of any
type of threat. The threat is detected using the input code of the different users.
Figure 3:Submission Screen
3. Threat page Screen: the threat page screen will help in displaying the different threats
which are presented in the system’s network. The threats which are displayed are
stored in the database. The threat page screen shows the different types of threats
which are presented in the system.
4. Threat removing page screen: this screen consists of the threat removal technique in
order to remove the different types of the threats. The threat removal screen is used to
remove the different types of threats which are presented in the system in order to
remove all the threats.
12
chevron_up_icon
1 out of 27
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]