13-09-2014, 01:52 PM
Cybernetics Protector
Cybernetics.pdf (Size: 313.61 KB / Downloads: 111)
Abstract
—the purpose of this paper is to present a website
for Secret Intelligence Agency. The agency has always
used undercover agents to solve complex cases and
dismantle criminal organizations. The paper presents a
solution so that Secret Intelligence Agencies and their
agents can communicate and exchangethe evidences in a
secured way. The paper presents Cybernetics Protector
developed using the J2EE technologies.
INTRODUCTION
The Secret Intelligence Agency is the nation’s first line
of defence. It accomplishes what others cannot
accomplish and go where others cannot go. It carries
out the mission by collecting information that reveals
the plans, intentions and capabilities of the adversaries
and provides the basis for decision and action.The
Cybernetics Protector is software which allows a
security agency to handle various confidential missions
in a secured way. The Cybernetics Protector software is
concerned with the security of the country and thus
proper care has to be taken that confidential data from
within the database is not leaked out.
. Encryption and Decryption[2]
This system is based on the 3 pillars of information
security- Confidentiality, Integrity and Availability. The
digital signature used here protects the integrity and
authenticity of a message. However other techniques
are still required to provide confidentiality of the
message being sent. Encryption is the process of
transforming information (referred to as plaintext) using
an algorithm (called a cipher) to make it unreadable to
anyone except those possessing special knowledge,
usually referred to as a key. The result of the process is
encrypted information (in cryptography, referred to as
cipher text).
.CONCLUSION
This project thus allows secret agencies to manage
secret cases in a secured and confidential way. The
secured login system which uses face recognition login
provides a high level of security. Digital Signatures and
encryption used will help to prevent unauthorized
access to data. Thus this project achieves information
security by following the 3 principles of
‘Confidentiality’, ‘Integrity’ and ‘Authenticity