Design and Implementation of Cybersecurity Risk Assessment System
Design and Implementation of Cybersecurity Risk Assessment System
ASSESSMENT SYSTEM
SUPERVISED BY:
DR SALIMONU, R.I. (PhD)
NOVEMBER, 2024
CERTIFICATION
I certify that this project was carried out by me BELLO ZAINAB OPEYEMI with
matric numbers (CS/HND/F22/3410), a student of the department of Computer
Science, School of Computing, Federal Polytechnic, Offa, Kwara State. In partial
fulfilment of the requirements for the award of Higher National Diploma (HND) in
Computer Science.
_____________________________ _______________________
PROJECT STUDENT
i
APPROVAL PAGE
This project work carried out by BELLO ZAINAB OPEYEMI with matric
numbers (CS/HND/F22/3410), has been read and approved by my supervisor for
submission to the department of Computer Science, School of Computing, Federal
Polytechnic, Offa, Kwara State. In partial fulfilment of the requirements for the
award of Higher National Diploma (HND) in Computer Science.
_____________________________ __________________________
PROJECT SUPERVISOR
_____________________________ __________________________
HEAD OF DEPARTMENT
ii
ABSTRACT
Cyber-attacks have increased in number and severity, which has negatively affected
businesses and their services. As such, cyber security is no longer considered merely
a technological problem, but must also be considered as critical to the economy and
society. Existing solutions struggle to find indicators of unexpected risks, which
limits their ability to make accurate risk assessments. This study presents a risk
assessment method based on Machine Learning, an approach used to assess and
predict companies' exposure to cybersecurity risks. For this purpose, four algorithm
implementations from Machine Learning (Light Gradient Boosting, AdaBoost, Cat
Boost, Multi-Layer Perceptron) were implemented, trained, and evaluated using
generative datasets representing the characteristics of different volumes of data (for
example, number of employees, business sector, and known vulnerabilities and
external advisor). The quantitative evaluation conducted on this study shows the high
accuracy of Machine Learning models and Especially Multi-Layer Perceptron was
the best accuracy when working compared to previous work.
iii
DEDICATION
This project is dedicated to God Almighty, the author of wisdom understanding, and
knowledge.
iv
ACKNOWLEDGEMENT
My utmost appreciation goes to Almighty God, the maker of the heaven and earth,
the Omniscience and Omnipotent God who had been my helper and sustainer
throughout this program.
My special thanks goes to parents Mr & Miss Bello who have been my sponsors. I
appreciated their efforts for their support in prayers, provisions and financial support.
I also appreciate my late coach for the word of advice for my journey to be
successful (may your soul continue to rest in peace)
Thank you very much for your support and may you live long to eat the fruit of your
labor (Amin).
I acknowledge the effort of my supervisor in person of Dr Salimonu R.I. for his
moral support and word of knowledge, impacted from the conception to the
actualization of this project work. May God bless you abundantly (Amin).
Also I appreciate the effort of my head of Department in person of Mr. Aliyu M.J
and all lecturer of Computer Science for their relentless effort to make my program a
successful one
I believe I am indebted to you all, once again, thanks for being there.
v
TABLE OF CONTENTS
CERTIFICATION.....................................................................................................................i
APPROVAL PAGE..................................................................................................................ii
ABSTRACT............................................................................................................................iii
DEDICATION.........................................................................................................................iv
ACKNOWLEDGEMENT........................................................................................................v
TABLE OF CONTENTS........................................................................................................vi
LIST OF TABLES..................................................................Error! Bookmark not defined.
LIST OF FIGURES................................................................Error! Bookmark not defined.
LIST OF APPENDICES.........................................................Error! Bookmark not defined.
CHAPTER ONE.........................................................................................................1
1.1 General Introduction
1.2 Statement of the Problem
1.3 Aim and Objectives
1.4 Significance of the Study
1.5 Scope of the Study
1.6 Limitation of the Study
1.7 Definition of terms
CHAPTER TWO........................................................................................................7
2.1 Theoretical Concept
2.2 Review of related work
CHAPTER THREE.................................................................................................17
3.1 Data Collection
3.2 Description of the proposed system
3.3 Analysis of the proposed system
3.4 System Design
CHAPTER FOUR....................................................................................................24
4.1 System Requirements
4.2 System Implementation
4.3 Results presentation
vi
4.4 System Evaluation/Testing (optional)
4.5 System Documentation and Maintenance
4.6 Benefits of the System
CHAPTER FIVE......................................................................................................29
5.1 Summary
5.2 Conclusion
5.3 Recommendation
REFERENCES.........................................................................................................32
APPENDIX
FLOWCHART
PROGRAM CODING
PROGRAM OUTPUT
vii
viii
CHAPTER ONE
INTRODUCTION
1.1. General Introduction:
The use of mobile applications also referred to as mobile apps has become highly
pervasive in recent times. According to (Kadiri, 2013) A mobile app is an
application software designed to run on a mobile handheld device such as a
smartphone, Android device, or computer. It is usually developed to serve as an
interface to the standard application. The importance of mobile apps in mobile
devices is undeniably unending as their application spans several areas of everyday
life and activities such as communication, education, cooking, social media,
shopping, business, banking, and a lot more. Whatever its application area, mobile
apps generally have some common features which include analytics, content display,
in-app messaging, location services, navigation and search, offline access, push
notifications, security, settings and preferences, social media integration, user
authentication and user profile. Regarding its application in education, it is used for
tertiary teaching and research by academic staff and undergraduate students. This has
become necessary especially when students have to share their research work in the
form of a thesis with an academic staff (supervisor). Previously, this type of
communication was done using printed papers, which has become inconvenient and
exhausting. The use of mobile apps in sharing, preparing, and assessing students by
their project supervisors has proved to be time-saving, economical, and convenient.
In line with these benefits, this paper focuses on the design and implementation of a
project assessment and presentation mobile application for tertiary schools. Several
researches have been conducted in the designing and implementation of mobile apps
for its various areas of applications. An overview of the key themes, trends, and
significant contributions in the field of app development are as discussed below. In
2022, conducted a survey that was made available to staff and higher-degree students
(collectively referred to as academics) across the University to capture their
perspective on mobile app use for teaching and research. The report talked about
how a survey was available to staff and higher degree students across the university
to capture their perspective on mobile application use for teaching and research.
1
Performed a comparative demonstration and Analysis of File Sharing Applications
on Android Mobile Devices. The research was focused on the file-sharing
applications running on smartphones specifically Android mobile devices (Irfan,
2016). Demonstration was performed by conducting file sharing on an Android
mobile device using mobile file sharing applications by transferring all types of files
such as single small files, single big files, and multiple small and big files to
compare the file transfer rate among these file sharing applications. Different
analysis was performed focusing on ease of access and compatibility and the results
obtained were presented. Study focused on the application of the design science
research approach in the development of a mobile learning application called
MobileEdu for computing education in the Nigeria higher educational context. It
described analysis, design, and implementation activities related to the development
of MobileEdu and also deliberated on the characteristics and scope of its adherence
to the traits and ideas of design science research. The design was evaluated in a real-
life learning setting, through an experiment conducted with 142 third-year
undergraduate students in a Nigerian university. Proposed an implementation of a
mobile application-based P2P learning system that was named “Each Other”. The
implementation scenario is on students of an IT course at the High School of
Technology of Fez (ESTF). The study focused on the conception, development, and
implementation of a mobile application based on an Android system to support
collaborative learning, through the application of object-oriented modelling language
which is Unified Modeling Language (UML). designed a seamless file-sharing
application for Android devices. In this study, it was concluded that the application
could be a solution for frequent disconnection of P2P file sharing in mobile devices.
Since SFS doesn’t use the server, there were no additional communication costs. It
was said that all users need a simple operation done by themselves. This improved
the limitation of devices such as low battery or lack of capacity. Designed,
developed, and presented two applications to support students learning in the Greek
secondary education environment. The structure and functions of the two
applications were presented under the names “Aepp_App” and “CS_App”. The
mobile applications were intended for use by teachers and students during a lesson as
well as outside the classroom setting, with the use of Android mobile devices.
2
Implemented a P2P file-sharing system which showed that a P2P file-sharing system
between mobile devices can be designed and implemented using Bluetooth as a
communication protocol. The application allows J2ME and MIDP (Mobile
Information Device Profile) enabled mobile devices to share and publish the files in
the network over Bluetooth, search for specific types of files such as (music,
pictures, text, and programs) and download them onto their local memory. It is
possible to develop the system in the future, to add more features and the capacity to
work on more than one operating system for mobiles. Provided an overview of
previous studies conducted on mobile learning applications and investigated the
challenges and difficulties of the design and development of mobile learning
applications. To have a better understanding of implementing a mobile learning
application, a prototype of one mobile learning application was developed to educate
and enhance motivation among adults to donate specific necessities for
underprivileged students. Designed and implemented a mobile application to
disseminate students’ results of their examinations using Java programming
language, Phased model as Software Development methodology, and Android
technology. The study obtained it’s through documentation, interview, and
observation techniques. Developed a mobile application to simplify the learning
process in secondary and high schools. The mobile application was developed on the
Andriod operating system given the extensive use of mobile devices and a
convenient application development toolkit. The mobile application is meant to
simplify the acquisition of information required for an effective educational process.
A pedagogical experiment was conducted as part of the study at the (Toraighyrov,
2018) Pavlodar State University.
1.2. Statement of the Problem:
This study seeks to merge the hybrid cryptography algorithm with files stored on the
cloud systems. We want to create a system that would store files in form of text and
document, Taking security seriously is the main theme of this project. The files
stored would be stored and encrypted to as to preserve the security and then can only
be retrieved with the use of the decryption key.
3
1.3. Aim and Objectives of the study:
The aim of the study is to design and implement a mobile app security assessment
system that will creating a functioning web application capable of storing android
files and encrypting them in a cloud database
Objectives:
The objectives are detailed statements describing the ways through which you intend
to achieve the goal.
This study brings out the academic and theoretical aspect of data assessment and
confidentiality into real life working software. This project would result in
the building of a software that can be further used for research purposed for the
function of improvement in data security.
The scope of the study would be contained and limited to relatively applications and
smaller file formats like texts, images, some small sized audio and videos. The
reason for these limits placed on them is to ensure that the small cloud space
budgeted is not exhausted in the course of testing and deployment. Large cloud space
for storage also correlates with a large fee for the cloud service.
4
1.6. Limitation of the Study:
Mobile app: referred to as mobile apps has become highly pervasive in recent times.
5
CHAPTER TWO
LITERATURE REVIEW
2.1 Theoretical Concept:
6
2.1.2 Threat Modeling
These models aid organizations in prioritizing risks by focusing on the most critical
threats to their infrastructure.
Theoretical research highlights the challenges of integrating ML, such as data quality
issues, model interpretability, and computational demands.
Threat Feeds: Sources like Open Threat Exchange (OTX) and commercial
threat intelligence platforms provide actionable data.
Integration Challenges: Theoretical studies discuss the need for seamless
integration of threat feeds into existing risk assessment systems.
10
CHAPTER THREE
METHODOLOGY
3.1 Data Collection:
The proposed system was design using the structured system analysis and design
methodology. The system was built on the Web platform. The front-end interface
was designed using flutter wave, while the backend functionalities are powered by
MySQL (a relational database management system) in designing the database which
runs on freely on Desktop. This language was chosen because of its flexibility and
features for developing offline based applications. In gathering and collecting
necessary data and information needed for system analysis, two major fact-finding
techniques were used in this work and they are:
Primary source
Secondary source
Primary Source
Primary source refers to the sources of collecting original data in which the
researcher made use of empirical approach such as personal interview and
questionnaires. CyberSecurity Risk Assessment System were studied and a lot of
information concerning the system in question was obtained. Some forms that are
necessary and available were assessed. Also internet downloads was made to obtain
some text materials.
Secondary Source
The need for the secondary sources of data for this kind of project cannot be over
emphasized. The secondary data were obtained by the researcher from magazines,
Journal, Newspapers, Library source.
3.2 Description of the proposed system:
The proposed system is a Cybersecurity Risk Assessment System designed to identify,
analyze, and mitigate cyber security risks in real-time, leveraging machine learning and
automation to improve efficiency and accuracy. The system will assist organizations in
proactively managing their cybersecurity risks by automating the assessment of
vulnerabilities, predicting potential threats, and providing actionable insights for risk
11
mitigation. This approach aims to overcome the limitations of manual methods, such as time
consumption, data dependency, and scalability issues.
The architecture of the proposed system can be illustrated using a Data Flow Diagram
(DFD), which shows the flow of data between different system components and processes.
An Entity-Relationship Diagram (ERD) will represent the data model of the system,
capturing entities such as risks, users, incidents, and mitigation actions, as well as the
relationships between them
Key Entities:
12
i. Input:
ii. Output:
Raw Data: Raw threat intelligence feeds, security logs, and system
configuration details are processed and stored in the database for further
analysis.
Data Preprocessing: Cleaned and structured data for risk modeling (e.g.,
parsing log files, standardizing threat feed formats).
iii. Database:
13
Use Case Diagram A Use Case Diagram highlights the interaction between users
and the system.
Actors:
Use Cases:
Administrator
Monitor Threats
14
CHAPTER FOUR
Modular Design The modular design involves the process of classifying the
application elements into different sub-systems. The modular design of this
application is divided into collage details- which shows the important
notifications and activates in the college, student details- which shows student
performance track record and faculty details- which shows faculty personal and
professional details.
15
In implementing the system use Java NetBeans as front end and MYSQL database as
the back end.
4.3 Results presentation:
The section presents the results after the work is implemented. Results presentation
section discusses the findings in the study. This are presented in:
17
Figure 5: print out of the result after assessment
4.4 System Evaluation/Testing (optional):
This is the process of confirming whether the new system is working according to
the specification. Testing are pertinent in this system, because it will minimize or
eliminate the errors in an online shopping system. This test will show exactly the
type of problems develop in the system in the processing of data and would also
indicate any problem in the respond time of the system. The process of testing the
system is to defect errors and debug them before it is delivered, installed and made
operational errors including bugs that cause system not to work according to
specifications.
18
Program Documentation: Stock control system (SCS) and inventory
management is a program controlled by various program noodles which
are written using vs code.
System Documentation: This is done at design time with the purpose of
aiding controls by providing a record of what has been developed and
what has been changed.
User-Reference Documentation: This is the step-by step information guide
design to system were in carrying out task with new system.
To use the new system, the user has to follow the under listed instructions:
Boot the computer to desktop environment
Slot in the software into your CD drive, wait and follow the instruction for
installation.
A welcome screen will appear showing author’s information like (name and
password) as well as the file of the software from which the user will check
“Login”.
A login screen will appears, then the user is required to type or Keyin the “user
ID” and password”.
From here, the program will open the main men where other sub menu are
attached.
Maintenance includes program update with time as need, debugging of the program,
repairs, hardware/software changes as need be for safety and management purposes,
anti-virus software should be installed before using the new system to avoid system
failure. This following are recommended: Air conditioner or fans should be provided
to help in cooling the system, Ups, voltage regulator (stabilizer), lightening arrestors,
automatic fine alarm and smoke detector is also recommended to maintain the
system.
It allow the client can walk to any of the designated banks anytime during banking
hours and make deposit into his/her account. The function the administrator can
perform is to create a client record, update payments and transactions, show record
19
of client currently registered and using the card. There are forms on different pages
of the application that makes the administrator achieve these functions.
20
CHAPTER FIVE
5.1 Summary:
5.2 Conclusion:
21
Incorporating a scalable design that supports the addition of new data sources
and threat models.
5.3 Recommendation:
22
23
24
REFERENCES
Chao, S. &. (2017). Application security means many different things to many
different people.
GB/T364666. (2018). classification method in and several threats that the industrial
control systems may face, .
25
26