0% found this document useful (0 votes)
74 views3 pages

Cybernetic Protectors: Existing System

The document proposes a software called Cybernetic Protectors to facilitate secure communication between secret intelligence agencies and their agents. The existing system for this process lacks security and functionality. The proposed system aims to automate the process and address the issues in the existing system by providing features like encrypted evidence uploading, activity tracking, online recruitment and chatting between roles. It describes the modules for different user roles, including citizens, agents, agency chiefs and the defense ministry. The software requirements and hardware requirements are also specified.

Uploaded by

The Futura Labs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views3 pages

Cybernetic Protectors: Existing System

The document proposes a software called Cybernetic Protectors to facilitate secure communication between secret intelligence agencies and their agents. The existing system for this process lacks security and functionality. The proposed system aims to automate the process and address the issues in the existing system by providing features like encrypted evidence uploading, activity tracking, online recruitment and chatting between roles. It describes the modules for different user roles, including citizens, agents, agency chiefs and the defense ministry. The software requirements and hardware requirements are also specified.

Uploaded by

The Futura Labs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cybernetic Protectors

ABSTRACT
The main objective of Cybernetic Protectors is to provide a secure way of communication and
transferring evidences in Secret Intelligence Agency of defence system which has always uses
undercover agents to solve complex cases and dismantle criminal organizations.
We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their
agents can communicate through this Software for the exchange of evidences in a secure way. And
maintain the details of Defence Minister.

EXISTING SYSTEM:
 This existing system is not providing secure registration and profile management of all the users
properly.
 This manual system gives us very less security for saving data and some data may be lost due to
mismanagement.
 The system is giving only less memory usage for the users.
 The system doesn’t provide facility to track all the activities of Agency-Chief and under working
Agents.
 The system doesn’t provide any facility to maintain any tips & suggestion for Citizen.
 The system doesn’t provide any functionality to upload evidences in encrypted format.
 This system doesn’t provide recruitment of agents through online.
 The system doesn’t provide any functionality to DefenceMinister/Secrete Agency-Chief/Agents
for online chatting.

Proposed System:
The development of this new system contains the following activities, which try to automate the entire
process keeping in the view of database integration approach.
 This system maintains user’s personal, address, and contact details.
 User friendliness is provided in the application with various controls provided by system rich user
interface.
 This system makes the overall project management much easier and flexible.
 Various classes have been used for maintain the details of all the users and catalog.
 Authentication is provided for this application only registered users can access.
 Report generation features is provided using to generate different kind of reports.
 The system provides facilities to track the all activities of Agency-Chief and Agents.
 System also tracks the tips and suggestion online.
 System provides facility to recruit Agents in online.
 System also provides facility to upload evidences in encrypted format and view cases, related
resources.
 This system is providing more memory for the users to maintain data.
 This system is providing accessibility control to data with respect to users.
 This system provides citizens to view success Stories.
 This system provides the functionality to Defence Minister/Secrete Agency-Chief/Agents for
online chatting.
MODULES:
1. Citizen
2. Under Cover Agent
3. Secret Intelligence Agency‘s chief
4. Ministry of Defense
5. Security and Authentication Module

Citizen:
i. Ability to see Success Stories.
ii. Ability to view for a job in Secret Intelligence Agency.
iii. Ability to give tips & suggestion.

Under Agent:
i. Able to view case details.
ii. Should be able to encrypt & upload evidence or data to Data Base.
iii. Able to view resources from ministry or chief.
iv. Generate Report.
Defense Ministry:
i. Should be able to send resources to Secret Agency.
ii. Receive reports.
iii. Ability to assign cases to the Agency.
Secret Intelligence Agency‘s chief:
i. Chief should be able to create/edit/view Agent’s profile.
ii. Appointing of Agent to a particular case.
iii. Secure retrieval of evidences received from Agent.
iv. Access to Data Base logs.
v. Generate Reports.
vi. Ability to store data with history (archive cases).
Security and Authentication Module:
The user details should be verified against the details in the user tables and if it is valid user, they should
be entered into the system. Once entered, based on the user type access to the different modules to be
enabled / disabled and individual user can change their default password or old password.

Software Requirements:
Operating System : Windows XP/.,2003 or Linux/Solaris
User Interface : HTML, CSS
Client-side Scripting : JavaScript
Programming Language : Java
Web Applications : JDBC, Servlets, JSP
IDE/Workbench : My Eclipse 8.6
Database : Oracle10g
Server Deployment : Tomcat 6.x

Hardware Requirements:
Processor : Core2duo
Hard Disk : 160GB
RAM : 1GB

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy