Friday, May 29, 2009

Intrusion Detection System

In the last three years, the networking revolution has finally come of age. More than ever before, we see that the Internet is changing computing as we know it. The possibilities and opportunities are limitless; unfortunately, so too are the risks and chances of malicious intrusions.
It is very important that the security mechanisms of a system are designed so as to prevent unauthorized access to system resources and data. However, completely preventing breaches of security appear, at present, unrealistic. We can, however, try to detect these intrusion attempts so that action may be taken to repair the damage later. This field of research is called Intrusion Detection.

Development of a system to automate payroll processing in an organization.

Abstract of the project
Consider a medium sized IT establishment which manages its own payroll requirements. This project will aim to develop an automated system to pay employees their monthly wages.

The system should store employee salary details and leave allowance. At the end of the month the system should automatically credit the employee’s bank account with their salary. Income tax and loan payments should be deducted at source and appropriate accounts credited. Salary slips should also be generated.

This system can be integrated with Leave and loan systems to give a holistic solution to the organization.
Keywords
Automated Payroll System.

Generic Technology keywords

Client Server and Electronic payment Technology

Specific Technology keywords

VB, Java, Oracle, Crystal Reports and XML.

Project type keywords

Analysis,
Design,
Implementation,
Testing (Software Engineering)

Functional components of the project
1) Data Entry screens to key in employee salary and bank details.
2) Integration with leave and loan system if already existing, else create screens to key in leave and loan details.
3) Credit Employee bank accounts electronically.
4) Generate electronic or hard copies of pay slips.
5) Implement back up and disaster recovery strategies.
6) Enable users to modify income tax details as these may change frequently.