Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...
Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted that the main reas...
BACKGROUND OF STUDY
The notion of auditing data dates back to ancient times, with the oldest signs of its existence discovered among major landowners of the Middle Ages in Italy and Egypt.
However, according to afounka (1993), statutory auditi...
Background Of The Study
Different libraries exist for different purposes. These purposes include function, type of users and the reason for establishing the library. These account for the major differences in libraries. Okiy in Tinuoye (2010) asserted t...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
Background of the Study
Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in...
OBJECTIVE OF THE STUDY
The aim of this study is to design and implement a database driven online virtual marketplace with a particular reference to Ogbete main market. The web based program developed in this research essentially provides all the necessary marketing serv...
Background of the Study
A biometric system is, in essence, a pattern recognition system that functions by first gathering biometric data from a person, then extracting a feature vector from the collected data, and then comparing the extracted feature vector with the fea...
Abstract
The study looked into the assessment of fingerprint authentication system for ATM security. Specifically, the study aim to provide a platform that will allow the bankers to collect customers’ finger print, provide a platform t...
ABSTRACT
The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of pe...
ABSTRACT
In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the le...
ABSTRACT
Solanum incanum Linn. and Solanum melongena Linn (Solanaceae) are both shrubs or trees found in the sub-Saharan Africa and the Middle East. Both are called „gauta‟ among the Hausa community of Northern Nigeria and „Tarku‟ among the Bura/Babar speaking people of Sout...
ABSTRACT
Depression is a heterogeneous mood disorder that has been treated with a number of synthetic drugs. These drugs have adverse effects and delayed onset of action that compromise their therapeutic benefits. This makes it worthwhile to search for new antidepressant agents with pro...
Statement of the Problem
The existing system is plagued with the following problems;
Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance i...
Statement of the Problem
The existing system is plagued with the following problems;
ABSTRACT
Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...
ABSTRACT
Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining pro...
Introduction
This chapter introduces the dissertation by describing its context, the identified challenges, how the chosen challenge was met, the achieved impact, relevant publications, and how the thesis is structured. 1.1 Context In science data is the essential focal point in todays...
ABSTRACT
Digital images continue to be ever-present in our daily lives as means of conveying information. With the availability of image editing software, now more than ever our ability to trust the images we see have been brought into question; the field of digital ima...
Abstract
Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over an insecure communications network. PasswordAuthenticated Key Exchange (PAKE) assumes that the parties in communication share a simple password, which...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
Background of the Study
Apart from teaching and community service, universities emphasize research as one of their main duties as institutions of higher learning. A institution that fails to produce remarkable research that can be used to move society a...
Background of Study
Electronic commerce, also known as e-commerce, has developed rapidly in recent years. More and more and more consumers prefer to shop online for convenience and other benefits. E-commerce and auctions are also attracting attention. Many internet companies like eBay a...
1.1 Background of the Study
Financial inclusion is a critical driver of economic growth, aiming to provide affordable and accessible financial services to underserved populations. In Nigeria, a significant portion of the population remains unbanked or underbanked, particularly in rural...
1.1 Background of the Study
Biometric authentication systems, which include technologies like fingerprint recognition, facial recognition, and voice identification, have revolutionized user security in digital platforms. As cyber threats continue to increase, traditional password-based...
Background of the Study
In an era of digital banking, the security of data is paramount, especially for financial institutions like microfinance banks that deal with sensitive customer information and financial transactions. Cybersecuri...
Background of the Study
Digital identity systems are technologies that authenticate and verify an individual’s identity online through biometric data, credentials, or digital certificates (Kim & Lee, 2023). These systems have become a vital tool in preventing...
Background of the Study
Biometric authentication has emerged as a key technology in securing financial transactions by verifying the identity of users through unique physical characteristics such as fingerprints, facial recognition, and retinal scans (Bose & Jayapal...
Background of the Study
As the frequency and sophistication of cyber-attacks continue to rise globally, cybersecurity has become a critical concern for financial institutions, particularly banks. In Kogi State, where digital banking adoption is increasing, cybersecurity...
Background of the Study
Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...
Background of the Study
E-commerce platforms have experienced significant growth in recent years, providing consumers with convenient ways to shop online. However, this growth has also attracted cybercriminals seeking to exploit security vulnerabilities, leading to frau...
Background of the Study
Artificial intelligence (AI)-driven voice recognition technologies are increasingly being utilized to enhance customer experiences and operational efficiency in various industries, including banking. In the context of financial t...
Background of the Study
Biometric authentication has gained traction as a secure and efficient method for verifying user identities in financial transactions. By using unique biological characteristics such as fingerprints, facial recognition, and voice patterns, biometric systems offer...
Background of the Study
Digital identity management involves the use of technology to authenticate and manage individuals’ identities in digital environments. Banks rely heavily on digital identity management solutions to enhance security, ensure regulatory compliance, and provide...
Background of the Study
As financial institutions increasingly rely on digital platforms, the need for robust cybersecurity measures has become more critical. Cybersecurity investments and risk mitigation strategies are essential for protecting sensitive data and ensuring the integrity...
Background of the Study
The growth of e-commerce has revolutionized retail, providing convenience and accessibility to consumers. However, it has also exposed online retailers to security vulnerabilities, including phishing attacks, payment fraud, and data breaches (Ibrahim & Olayem...
Background of the Study
Cyber resilience refers to an organization's ability to anticipate, withstand, recover from, and adapt to cyberattacks. In the banking sector, where sensitive financial information is stored and processed, implementing effective cyber resilience strategies is...
Background of the Study
The proliferation of digital identity systems is reshaping fraud prevention strategies in the financial technology (fintech) industry. Digital identity systems leverage advanced technologies such as biometrics, cryptography, and blockchain to authenticate users,...
Background of the Study
Network access control is a crucial component of network security, especially in institutions with large and diverse user bases like Federal University, Lafia, Nasarawa State. Network access control mechanisms are designed to ensure that only author...
Background of the Study
In educational institutions like Federal University, Kashere, Gombe State, secure file sharing is essential to protect sensitive academic, administrative, and research data. The university’s network is used extensively for file transfers betwe...
Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Feder...
Background of the Study
The need for secure remote access to university networks has grown with the increasing trend of remote learning, telecommuting, and the digitalization of university services. Federal University, Dutsin-Ma, Katsina State, has seen a rise in the numbe...
Background of the study:
In the digital age, e-libraries have become essential components of academic institutions, providing easy and efficient access to educational resources. However, ensuring the security of these e-libraries is paramount due to the increasing risks po...
Background of the study:
The use of Virtual Private Networks (VPNs) has grown significantly in recent years as organizations and institutions look for secure methods of enabling remote access to their network resources. In the context of universities, VPNs are particularly...
Background of the Study:
As cyber threats continue to evolve, securing user authentication processes has become a top priority for institutions like Federal University, Lokoja, Kogi State. Multi-factor authentication (MFA) is an effective strategy for enhancing the securit...
Background of the Study:
Network security is an essential component of modern academic institutions, particularly for safeguarding critical resources, such as student records, research data, and administrative systems. Traditional authentication methods, like passwords and...
Background of the Study
Data transmission security is a critical aspect of modern network infrastructure, particularly in academic institutions that handle vast amounts of sensitive data, including student records, research outputs, and administrative c...
Background of the Study
With the increasing reliance on digital platforms for research, administration, and communication, universities are prime targets for cyberattacks. Traditional security measures often fail to prevent sophisticated attacks such as...
Background of the Study
Research institutions generate and store large volumes of sensitive data, including experimental results, intellectual property, and confidential academic records. The security of this data is paramount to maintaining research in...