Security Reporting Tool (CSRS) : Abstract
Security Reporting Tool (CSRS) : Abstract
Abstract: To Develop a CSRS System for a network ,which should study the hackers behaviour and store it in a DataBase.
CSRS can play a key role in a defensive strategy. While there are many studies and sources for information, there is no single source that discusses the major strategic issues concrerning CSRS. The main attraction of a CSRS is not limited to what you can learn but how you can learn it. As a result, a CSRS fits into the defensive plan as a way of Studying black hat activity. Developing a reasoned response to the threat, Testing and developing new responses and tactics to a given threat, and CSRS can also slow down another attack thus allowing time to develop a countermeasure.
Synopsis: CITS is a powerful human resource tool for maintaining employee and company information. More then a data storage program, CITS helps you manage your employee. CITS offers a wide variety of reports that give you exactly the information you need. vie payroll information by department, or find everyone who is receiving company Benefits. CITS gives you the power of information with different report categories.
You can import from third party programs such as excel or louts. CITS also allows you to export your data to other programs. When you import data, you have the option of Adding the information to your existing CITS database or replacing your CITS database with the imported one. (Remember, once you delete your data, it can not be retrieved.) After the import process is complete, CITS will close down and you must restart the program to access your data.
CITS allows you to add and remove employee from the program and provides access to all employee information categories from Address History to work information. Organization files keep track of your company information. From this screen you can
crate, modify, and Remove company data. You can adjust data for company benefits, department, evaluation categories, and positions It is a good idea your department and positions before adding employees. You must also set up your company benefits and evaluations before adding them to your employee files. When you create a new category such as an Additional department or position, it is immediately available for selection in every applicable employee screen. Checklists assist you in office management by creating a list of items the need to be completed for a done when someone is hired.
You might add items such as complete I-9 or Introduce to other employees. The Automatic office Assistant cheeks your employee and department information for specific items and informs you of possible errors. You can instruct The Automatic
Assistant to check for missing information of other anomalous data patterns. To access the office Assistant you must have security access to all departments and edit access to personal. The Automatic Office Assistant will check only the information in the Modules being checked list box. To add an item to the list box, first select the module category then place a check mark beside the item in the category you want to check. The Automatic Office Assistant will add the item to your Modules being checked list box. There are two modes for selecting data, Regular mode and Scheduler mode. You can create a separate list for each mode. When you assign modules to the modules being checked list box, be aware of which mode you have selected. You can choose to have the Onboard Assistant do a Regular check or you can use the Scheduler.
CITS allows you to preview and print different reports that range from individual Work History to department Headcounts. Each report screen has different option. You can change the name of the report by editing the Report Title field. This will not change the name of the report in the drop down box, only the name as it appears on the report in the information such as the report title and date. Your company name (if selected) and report title will appear in every header. If you choose to have your company logo displayed on your report, it will appear in the top left corner .directly above the page number. The header may also contain information such as the employee name, department, and selection criteria.
HOTEL MANAGEMENT SYSTEM Abstract: An easy to operate user friendly, economically priced software that Committed to meet the all requirements to manage small, medium and big scale hotels. Hotel Management System is one of the leading software for complete management of your Hotel; it can manage the reception, restaurant, inventory and accounts excellently. The hotel management software provides all kinds of record keeping feature required in a hotel like day books, daily business book, Preparation of OFI and many more automatically. The project has been planned to be having the view of distributed architecture, with centralized storage of the database. The application for the storage of the data has been planned. Using the constructs of MS-SQL Server and all the user interfaces have been designed using the ASP.Net technologies. The database connectivity is planned using the SQL Connection methodology. The standards of security and data protective mechanism have been given a big choice for proper usage. The application takes care of different modules and their associated reports, which are produced as per the applicable strategies and standards that are put forwarded by the administrative staff. The entire project has been developed keeping in view of the distributed client server computing technology, in mind. The general users and the organizational administration have normalized the specification up to 3NF to eliminate all the anomalies that may arise due to the database transaction that are executed. The user interfaces are browser specific to give distributed accessibility for the overall system. The internal database has been selected as MS-SQL server. The basic constructs of table spaces, clusters and indexes have been exploited to provide higher consistency and reliability for the data storage. The MS-SQL server was a choice as it provides the constructs of high-level reliability and security. The total front end was dominated using the ASP.Net technologies. At all proper levels high care was taken to check that the system manages the data consistency with
proper business rules or validations. The database connectivity was planned using the latest SQL Connection technology provided by Microsoft Corporation. The authentication and authorization was crosschecked at all the relevant stages. The user level accessibility has been restricted into two zones namely the administrative zone and the normal user zone