0704-883-0675     |      dataprojectng@gmail.com
1

1. COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM

INTRODUCTION

The interconnection of computer with other related office equipments are finding increasing application in almost all field of human endeavour most especially the financial

 sector. More and more banks are introducing the us...

Read more

2. MULTI-LEVEL INTRUSION DETECTION AND LOG MANAGEMENT SYSTEM IN CLOUD COMPUTING

INTRODUCTION

As Green IT has been issued, many companies have started to find ways to decrease IT cost and overcome economic recession. Cloud Computing service is a new computing paradigm in which people only need to pay for use of services without cost of purchasing ph...

Read more

3. COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM: A CASE STUDY OF DIAMOND BANK NIG PLC OWERRI

INTRODUCTION

The integration of computers with other relevant office equipment is finding growing use in virtually every aspect of human endeavor, but particularly in the realm of finance. The usage of computer networks is becoming increasingly commonp...

Read more

4. DESIGN OF INTRUSION DETECTION AND PREVENTION SYSTEM IN MICRO FINANCE BANK IN IKOT EKPENE

Introduction

An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...

Read more

5. INTRUSION DETECTION, AND PREVENTION SYSTEM USING GUFAX MICRO FINANCE BANK PLC, IKOT EKPENE AS A CASE STUDY

  1.   Introduction

An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by...

Read more

6. DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

STATEMENT OF THE PROBLEM

The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.

The choice of data encryption comes next in...

Read more

7. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

 

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance i...

8. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining pro...

Read more
whatsapp