1 NSS DEVELOPERS. Group Members Group Members NSS DEVELOPERS2  Anurag Sharma  Devesh Kumar Gupta  Alok Gangwar  Kuldeepak Panday Project Guide: Mr.

Slides:



Advertisements
Similar presentations
Absence Credit Tracking System April 10, Team Members: Joshua Allen Dave Kristensen Greg Ludwinski Samantha Ratnapuli.
Advertisements

HES Data Management Ari Haukijärvi. Planning of HES Data Management Purpose of the data management The data will be available for analysis The available.
Facts about Welcome to this video from Ozeki. In this video I will present what makes Ozeki Phone System XE the Worlds best on-site software PBX for Windows.
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Crucial Patterns in Service- Oriented Architecture Jaroslav Král, Michal Žemlička Charles University, Prague.
Soundararajan K A. WHAT MOTIVATES US ? GIS Why?
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
XProtect® Expert 2013 Product presentation
DESIGNING A PUBLIC KEY INFRASTRUCTURE
CSE 4939 Hito-Shura Project Manager Harlan Broughton Stephen Link.
Internet Development 1 Introduction Colm O Suilleabhain.
The University of Akron Dept of Business Technology Computer Information Systems Database Management Approaches 2440: 180 Database Concepts Instructor:
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
Sample School Website Sydney Region ITSU School Support
United Nations Development Program India Coordination & Decision Support System (CDSS) on External Assistance Department of Economic Affairs Ministry of.
Make your messaging reliable use it Messaging. A single and global solution Send, receive and process any type of message through the appropriate channel.
Video Surveillance Capturing, Management and Analysis of Security Videos. -Abhinav Goel -Varun Varshney.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
Mobile One-Time Password. Page 2 About Changingtec -Member of group -Focus on IT security software CompanyChanging Information Technology Inc Set upApril.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Human-Computer Interface Course 5. ISPs and Internet connection.
Computers & Employment By Andrew Attard and Stephen Calleja.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents Presented By Mr. Muhammad Awais Shibli.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
CAAMS : The Complete Automation Computer Aided Automation And Management System By Ajay Koul Sonika Gupta Faculty School of Computer Science and Engineering.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
NETWORK FILE ACCESS SECURITY Daniel Mattingly EKU, Dept. of Technology, CEN/CET.
Databases and Database Management Systems
X-Road – Estonian Interoperability Platform
GoodsWayGoodsWay Capstone Project Team information Goodsway.
Configuring Directory Certificate Services Lesson 13.
Introduction  Client/Server technology is seen by many as the solution to the difficulty of linking together the various departments of corporation.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Institute for Parallel Processing Bulgarian Academy of Sciences MySQL, PHP and Apache Server in Development of Database for Scientific Research in Defence.
NUOL Internet Application Services Final Presentation 24 th of May, 2004.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
1 ISA&D29-Oct ISA&D29-Oct-13 Systems Analyst: problem solver IT and Strategic Planning.
@ 2008 Copyright NIC I Do not distribute without permission E-Services for Transforming to the Next Generation Government “A Case Study of India” Suchitra.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Attack Tool Repository and Player for ISEAGE May06-11 Abstract Today’s world is changing shape as it increases its dependency on computer technology. As.
Sample School Website. What is wrong with the existing School Webspace Site? Can only host static pages – no dynamic content possible. Can not be edited.
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
Management Information Systems, 4 th Edition 1 Chapter 8 Data and Knowledge Management.
Standardisation and regulation on information security Margus Püüa Head of Department Department of State Information Systems Ministry of Economic Affairs.
Web Server.
Apache Web Server Architecture Chaitanya Kulkarni MSCS rd April /23/20081Apache Web Server Architecture.
Chapter 2 Database Environment.
Client – Server Architecture A Basic Introduction 1.
Web Cache. What is Cache? Cache is the storing of data temporarily to improve performance. Cache exist in a variety of areas such as your CPU, Hard Disk.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Presented By Shrikant Ravindra Kamble MCA 3 rd year.
GOVT. ENGINEERING COLLEGE, AJMER PRESENTATION ON GUIDED BY: MR. SANJAY SINGH PRSENTED BY: CHANDRASHEKHAR GARG KIRTI KUMAR VALIYA VIJAY SHARMA.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
Under the guidance of Mr. P. THIRUGNANAM, M.Tech, Senior Assistant Professor. S.RAJALAKSHMI DEPARTMENT OF CSE. IFET College of Engineering, VillupuramTamilnadu.
Customer Care & Help Desk. Content  What is Help Desk?  Who should use these?  Features of Help Desk  Hierarchy of Help Desk (Level of User)  Flow.
SQL Database Management
Cloud based Open Source Backup/Restore Tool
Relate to Clients on a business level
RKL Remote key loading.
Web Servers / Deployment
Unit# 5: Internet and Worldwide Web
Windows Server Administration Fundamentals
Presentation transcript:

1 NSS DEVELOPERS

Group Members Group Members NSS DEVELOPERS2  Anurag Sharma  Devesh Kumar Gupta  Alok Gangwar  Kuldeepak Panday Project Guide: Mr. Deepak Gupta

Role Parameters NSS DEVELOPERS3  Anurag Sharma…………………………………Database Design  Devesh Kumar Gupta………………………….Design & Coding  Alok Gangwar…………………………..…Requirements & Testing  Kuldeepak Pandey……………………Security & Maintenance

What is National Special Squad National Special Squad is a intelligence agency, which is goverened by central government to check external activities performing against India. This Agency will use undercover agents(having no legal attachment with it) to collect information beneficial to the country. NSS DEVELOPERS4

Problem Statement The country secret agencies (RAW,DOD) feel themselves unable to work efficiently because of improper sharing of information along with the security reason as their information are too confidential and the leakage of such information may lead to the failure of the whole operation. This may lead to the huge loss of money and time and also support uncomfortable situation (like: terrorist activities, riots, etc.) in the society that is not good for the country and the people. NSS DEVELOPERS5

There are various department in Indian Government but they are no Implementation of ERP System. There are traditional approach are used to Solve a problem. Traditional approach are consist more processing & more time. No department knows that what the other department do. So they can helps other in just-in- time. In case of Security Services this is very bad. NSS DEVELOPERS6

Solution  We are conceptualizing this software as a solution so that Secret Intelligence Agencies and their agents can communicate through this Software for the exchange of evidences in a secure way. NSS DEVELOPERS7.

Phase 1 # Requirements Users of the System  Defense Ministry  Secret Agency’s Chief:  Agent  Citizen NSS DEVELOPERS8

Users of the System NSS DEVELOPERS9 N.S.S. Software Under Cover Agents Secret Intelligence Agency‘s chief Ministry of Defense Citizen

Functional Requirements Defense Ministry: NSS DEVELOPERS10 Should be able to send resources to Secret Agency. Receive reports Ability to assign cases to the Agency.

Secret Agency’s Chief: NSS DEVELOPERS11 Chief should be able to create/edit/view Agent’s profile Appointing of Agent to a particular case. Secure retrieval of evidences received from Agent. Access to Data Base logs. Should be able to trace Agent’s location (using IP addresses) Generate Reports Ability to store data with history (archive cases). Ability to create Digital Signature certificates.

Under Cover Agent: NSS DEVELOPERS12 Able to view case details. Should be able to encrypt & upload evidence or data to Data Base. Able to view resources from ministry or chief. Generate Report. Should be able to view the dynamic map of anywhere in the world. Takes helps of chief, ICA and other dept.

Citizen: NSS DEVELOPERS13 Ability to see Success Stories. Chat assistance from Intelligence Agency. Ability to apply for a job in Secret Intelligence Agency. Ability to give tips & suggestion

Non – Functional Requirements Secure access of confidential data (user’s details). SSL can be used. 24 X 7 availability Better component design to get better performance at peak time Flexible service based architecture will be highly desirable for future extension. NSS DEVELOPERS14

Hardware & Software Requirements As a Server…., Hardware o Hard disk 100TB Software o Operating System o Server Apache o Database MySql o Language Java,J2EE, PHP o Software Packages NSS DEVELOPERS15

Questions………? Q1: How the chief track the location of agent? Q2: How the resources can be shared between them? Q3: which algorithm will be used for data encryption? Q4: How the video chat will be performed? NSS DEVELOPERS16

Phase 2 # Design To Design NSS System o Website must include following Services o mail o news o ftp o Directory o Chat o Video Chat o IP location. NSS DEVELOPERS17

Network Architecture NSS DEVELOPERS18

Web Server: 3-Tier Architecture NSS DEVELOPERS19

Google Map NSS DEVELOPERS20

How Google Map Works NSS DEVELOPERS21

Video Conferencing NSS DEVELOPERS22

How it works……! NSS DEVELOPERS23

Phase 3 # Implementation Software Design Web Design Server Design Installation Setup NSS DEVELOPERS24 wait

SOFTWARE TESTING SOFTWARE TESTING BRANCH TESTING BLACK BOX TESTING UNIT TESTING INTEGRATION TESTING WHITE BOX TESTING SYSTEM TESTING ACCEPTENCE TESTING NSS DEVELOPERS25

Phase 5 # Maintenance wait NSS DEVELOPERS26

NSS DEVELOPERS27

Query ? 28NSS DEVELOPERS

Thank You…….! 29NSS DEVELOPERS