0704-883-0675     |      dataprojectng@gmail.com

An evaluation of online security protocols in business banking: A case study of Sterling Bank, Kano.

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study

Online security protocols are essential for protecting sensitive financial data and ensuring safe digital transactions in business banking. Sterling Bank, Kano, has implemented various online security measures—including encryption, multi-factor authentication, and continuous monitoring systems—to safeguard its digital channels and customer data (Ogunleye, 2023). These protocols are designed to prevent cyber threats such as hacking, phishing, and data breaches, thereby building trust among corporate clients. The bank’s security strategy also includes regular system audits and compliance checks with regulatory standards to ensure that all digital transactions remain secure and verifiable (Ibrahim, 2024).

The evolution of cyber threats in the digital era necessitates that banks continuously update their online security measures. Sterling Bank’s efforts involve not only deploying advanced technological solutions but also fostering a culture of cybersecurity awareness among employees. However, despite these measures, challenges such as system vulnerabilities, integration issues with legacy software, and the high cost of security upgrades persist (Adeleke, 2025). The overall effectiveness of online security protocols is critical to the bank’s ability to maintain customer confidence and ensure smooth operational performance. This study evaluates the current state of online security protocols at Sterling Bank, examining both their strengths and areas where improvements are needed to counteract emerging cyber threats.

Statement of the Problem

Although Sterling Bank, Kano, has invested in robust online security protocols, it faces several challenges in fully securing its digital business banking operations. One significant problem is the integration of modern security measures with legacy systems, which can create vulnerabilities due to compatibility issues and outdated software components (Chinwe, 2023). Such integration challenges may lead to gaps in security coverage, leaving the bank exposed to potential cyberattacks. Additionally, the high cost of continuously updating and maintaining security systems poses a financial challenge, which can limit the bank’s ability to adopt state-of-the-art security protocols (Ogunleye, 2024).

Moreover, employee awareness and training in cybersecurity practices remain inconsistent, further undermining the overall security posture. These challenges result in a disparity between the intended level of protection and the actual security outcomes, thereby affecting customer trust and regulatory compliance. The study seeks to analyze these issues and determine the factors that hinder the full effectiveness of online security protocols in business banking at Sterling Bank.

Objectives of the Study

• To evaluate the effectiveness of online security protocols at Sterling Bank, Kano.

• To identify integration challenges between new security measures and legacy systems.

• To assess the impact of cost and employee training on online security performance.

Research Questions

• How effective are the current online security protocols in safeguarding business banking operations?

• What integration challenges affect the deployment of advanced security measures?

• How do cost factors and employee training influence online security outcomes?

Research Hypotheses

• H1: Robust online security protocols significantly reduce cyber threats in business banking.

• H2: Integration issues between modern security measures and legacy systems negatively impact overall security.

• H3: Increased investment in cybersecurity training and technology upgrades improves security effectiveness.

Scope and Limitations of the Study

This study is limited to the online security operations of Sterling Bank’s business banking division in Kano. Limitations include restricted access to detailed security incident data and the dynamic nature of cyber threats.

Definitions of Terms

• Online Security Protocols: Measures implemented to protect digital transactions and data.

• Encryption: The process of encoding data to prevent unauthorized access.

• Multi-Factor Authentication: A security process requiring multiple forms of verification.

• Legacy Systems: Older IT infrastructures that may not support new security technologies.

 





Related Project Materials

An assessment of informal education’s effectiveness in teaching students financial responsibility in Kwali Local Government Area, Federal Capital Territory

Background of the Study:
In recent years, the paradigm of education has shifted to incorporate informal educational methods...

Read more
An evaluation of customer-centric strategies in Islamic banking

Background of the Study
Customercentric strategies are increasingly recognized as essential for achievin...

Read more
An examination of AI-driven plagiarism detection tools among postgraduate students in Bayero University, Kano State

 

Background of the study
Plagiarism detection is critical in maintaining academic integrity, and AI-driven...

Read more
The Contribution of Agricultural Shows to Knowledge Sharing in Dutse Local Government Area, Jigawa State

Chapter One: Introduction

1.1 Background of the Study
Agricultural shows serve as platforms fo...

Read more
An assessment of mobile application usability on digital banking adoption in Nigeria: a case study of Heritage Bank

Background of the Study

Mobile application usability is a critical determinant of digital banking adoption, as it directly affects user s...

Read more
THE INFLUENCE OF CORPORATE GOVERNANCE POLICIES ON INVESTOR CONFIDENCE

Abstract: THE INFLUENCE OF CORPORATE GOVERNANCE POLICIES ON INVESTOR CONFIDENCE

This r...

Read more
An investigation of the use of social media as a learning tool among nursing students in University of Port Harcourt Teaching Hospital

Background of the Study

Social media platforms, which include tools like Facebook, Twitter, WhatsApp, and YouTube, have transformed the l...

Read more
PROBLEM AND PROSPECTS OF PIG FARMING IN OVIA NORTH EAST LOCAL GOVERNMENT AREA IN EDO STATE

ABSTRACT

The purpose of this study was to investigate problem and prospect of pig farming in Ovia North East Local G...

Read more
ASSESSING THE COVID-19 SAFETY COMPLIANCE LEVEL IN HEALTHCARE SECTOR

ABSTRACT

This study was carried out to assess the covid-19 safety compliance level in healthcare sector...

Read more
An Analysis of the Effect of Mobile Banking on Financial Inclusion in Nigeria

Background of the Study
Mobile banking has emerged as a transformative force in Nigeria’s financial landscape, signi...

Read more
Share this page with your friends




whatsapp