Download presentation
Presentation is loading. Please wait.
Published byPiers Carter Modified over 9 years ago
1
Encrypted Chat Program LCO Review Asif Daud & Craig Atkinson
2
Instant Message Eavesdropping Rival Company
3
Operational Concepts Will provide a secure and fast means of communication in the business world. Will provide a secure and fast means of communication in the business world. Program purchased by a company and clients installed on all employee computers, while having a central server at a location of their choosing. Program purchased by a company and clients installed on all employee computers, while having a central server at a location of their choosing. Technical staff of the company will be responsible for most of the maintenance and support of the software. Technical staff of the company will be responsible for most of the maintenance and support of the software.
4
System Requirements Secure conversations, and secure transmission of files. Secure conversations, and secure transmission of files. Contact list sorted by groups/teams in the company. Contact list sorted by groups/teams in the company. Ability to format text. Ability to format text.
5
System & Software Architecture Clients will connect to a central server through the TCP/IP protocol. Clients will connect to a central server through the TCP/IP protocol. Algorithms used: Algorithms used: –RSA public key-private key algorithm –GOST symmetric key algorithm –MD5 hashing algorithm to generate encryption keys.
6
Main Features Password protected accounts. Password protected accounts. Sortable lists of user contact information Sortable lists of user contact information Format message text with boldface, italics, font size, etc. Format message text with boldface, italics, font size, etc. Pre-recorded voice message alerts. Pre-recorded voice message alerts. Away messages. Away messages.
7
Life Cycle Plan Main target market: small-mid size businesses. Main target market: small-mid size businesses. Specific targets: Specific targets: –Contract companies –Telecommuting employees
8
Feasibility Rationale Risks: Risks: –Insufficient market –Existing products –Algorithms and architecture difficult to implement –Possible insecurity of encryption algorithms
9
Conclusion The software will be secure & useful. The software will be secure & useful. The project will be profitable. The project will be profitable. The project is feasible. The project is feasible.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.