0704-883-0675     |      dataprojectng@gmail.com
1

1. PUBLIC PERCEPTION OF NIGERIA ELECTRONIC NAIRA (E-NAIRA). A STUDY OF KANO METROPOLIS.

​​​​​​Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models have led in a slew of novel retail payment methods. These deve...

Read more

2. PROBLEM AND PROSPECT OF E-NAIRA IN NIGERIA.

Changing technology, economic advancement, and the desire to effectively fulfill the functions of money have all spurred monetary changes throughout history. These developments point to substantial changes in the retail payment environment, including a drop in cash usage. Digital money was born a...

Read more

3. A SURVEY OF THE INCREASE AND USAGE OF CRYPTOCURRENCIES IN AFRICA

Background of the study

Throughout history, people have exchanged products and services via a number of techniques and channels. Many of these methods and materials, such as metal coins or paper money, are typically physical.

Without a questio...

Read more

4. PROBLEM AND PROSPECT OF E-NAIRA IN NIGERIA.

Background of the study

Changing technology, economic advancement, and the desire to effectively fulfill the functions of money have all spurred monetary changes throughout history. These developments point to substantial changes in the retail payment e...

Read more

5. PUBLIC PERCEPTION OF NIGERIA ELECTRONIC NAIRA (E-NAIRA). A STUDY OF KANO METROPOLIS.

Background of the study

Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models...

Read more

6. THE BENEFIT OF E-NAIRA TO UNBANKED NIGERIANS

Background of the study

Many millions, if not billion of people will be able to use a range of convenient, accessible, and dependable financial instruments for the first time in the not-too-distant future, regardless of their proximity to tradition...

Read more

7. THE EFFECT OF E-NAIRA ON INFLATION

Background of the study

Inflation is a term used to describe the rate at which the price of goods and services rises over time. Inflation impacts not only the cost of life – items like transportation, power, and food – but also interest rate...

Read more

8. THE IMPACT OF ENAIRA IN TRACKING MONEY LAUNDERING AND FRAUD IN NIGERIA

Background of the study 

The promotion of cashless policies has become a driving factor for global economies to investigate currency digitalization as it fast tracks online transactions. Various uses of e-transaction, includin...

Read more

9. THE IMPACT OF E-NAIRA ON DEPOSIT MONEY BANK

Background of the study

Banks are a vital part of every economy. It is the driving force behind society and economic progress. The importance of banking services to any economy's growth and development cannot be overstated. Prior to the introduction...

Read more

10. THE INFLUENCE OF E-NAIRA AND SMALL BANKS SURVIVAL

Background of the study

A bank is a financial organization that collects deposits and puts those deposits into lending activities, either directly or through capital markets (Uremadu, S. 2012). Customers with capital shortages are linked to customers wi...

Read more

11. THE RELATIONSHIP BETWEEN E-NAIRA AND E-BANKING

Background of the study

The notion of electronic banking was born as a result of technological improvement in the banking system. Customers no longer need to visit a physical financial institution to complete a transaction; instead, they can do it from...

Read more

12. DESIGN AND IMPLEMENTATION OF ENCRYPTED DATA BASE SYSTEM

INTRODUCTION

In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....

Read more

13. Design and Implementation of an Intrusion Tolerant System

Abstract

The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...

Read more

14. DESIGN OF INTRUSION DETECTION AND PREVENTION SYSTEM IN MICRO FINANCE BANK IN IKOT EKPENE

Introduction

An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...

Read more

15. DESIGN AND IMPLEMENTATION COMPUTERIZED DATA ENCRYPTION SYSTEM

BACKGROUND OF THE STUDY

The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or e...

Read more

16. INTRUSION DETECTION, AND PREVENTION SYSTEM USING GUFAX MICRO FINANCE BANK PLC, IKOT EKPENE AS A CASE

Statement of the Problem

The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:

  1. Absence of an  intrusion  detection and prevention system.
  2. ...
Read more

17. DEVELOPMENT OF AN IMPROVED APPLICATION SPECIFIC TUNELLING PROTOCOL SELECTION SCHEME FOR SITE TO SITE VIRTUAL PRIVATE NETWORKS

ABSTRACT

This study presents the development of an improved application specific tunnelling protocol selection scheme (iASTPSS) for site-to-site virtual private network (VPN). The aim is to develop an improved tunnelling protocol selection scheme for site to site VPN that is application...

Read more

18. DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS

STATEMENT OF THE PROBLEM

The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.

The choice of data encryption comes next in...

Read more

19. DESIGN AND IMPLEMENTATION OF A STEGANOGRAPHIC SYSTEM- SECURTITY ENCRYPTION SYSTEM

ABSTRACT

Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...

Read more

20. PRACTICAL AND LIGHTWEIGHT DEFENSE AGAINST WEBSITE FINGERPRINTING

ABSTRACT

Website fingerprinting is a passive network traffic analysis technique which enables an adversary to identify the website a user visited despite encryption and the use of privacy services such as Tor. Several website fingerprinting defenses built on top of Tor have been put for...

Read more

21. DEVELOPMENT OF A MORE SECURED BANKING TRANSACTION AUTHENTICATION APPLICATION

ABSTRACT

Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...

Read more

22. THE DETECTION AND PREVENTION OF SNIFFING ON NETWORKS

ABSTRACT

With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to th...

Read more

23. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more

24. EXPLORING THE APPLICATION OF NUMBER THEORY IN CRYPTOGRAPHY

Background of the study

Cryptography has a long and intricate history that intertwines with the development of number theory. From the ancient ciphers of Julius Caesar to the complex algorithms used in modern-day encryption, the evolution of cryptograph...

Read more

25. AN ASSESSMENT OF CYBERCRIME AND DIGITAL FORENSIC ACCOUNTING TECHNIQUES

Abstract: AN ASSESSMENT OF CYBERCRIME AND DIGITAL FORENSIC ACCOUNTING TECHNIQUES

This study assesses the effectiveness of digital forensic accounting techniques in combating cybercrime in the financial sector in Lagos. The objectives are to evaluate the effectiveness of various digital...

Read more

26. An examination of the impact of cybersecurity measures on forensic accounting processes in Nigeria: A study of fintech firms

Background of the Study

The rise of digital technologies and financial innovations, particularly in the fintech industry, has transformed the landscape of financial transactions in Nigeria. However, the rapid growth of these technologies has also led to increased vulner...

Read more

27. The Role of Technology in Preventing Financial Fraud: A Case Study of Interswitch

Background of the Study

Technology plays a crucial role in combating financial fraud by providing advanced tools for fraud detection, prevention, and reporting. Interswitch, a leading technology-driven financial services company in Nigeria, has pioneered innovations suc...

Read more

28. The Impact of Cybersecurity Measures on Data Security in Financial Institutions: A Case Study of Microfinance Banks in Sokoto State

Background of the Study

In an era of digital banking, the security of data is paramount, especially for financial institutions like microfinance banks that deal with sensitive customer information and financial transactions. Cybersecuri...

Read more

29. An Examination of Cybersecurity Investment and Risk Mitigation Strategies: A Case Study of Banks in Kogi State

Background of the Study

As the frequency and sophistication of cyber-attacks continue to rise globally, cybersecurity has become a critical concern for financial institutions, particularly banks. In Kogi State, where digital banking adoption is increasing, cybersecurity...

Read more

30. A Review of Digital Identity Management Solutions and Their Security Risks: A Study of Banks in Bauchi State

Background of the Study

Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...

Read more

31. An Exploration of E-commerce Security Vulnerabilities and Fraud Prevention Techniques: A Study of Online Retailers in Kano State

Background of the Study

E-commerce platforms have experienced significant growth in recent years, providing consumers with convenient ways to shop online. However, this growth has also attracted cybercriminals seeking to exploit security vulnerabilities, leading to frau...

Read more

32. An evaluation of the effectiveness of cybersecurity policies in preventing data breaches: A case study of fintech firms in Niger State.

Background of the Study: Cybersecurity has become an essential concern for businesses, particularly in the fintech sector, where digital transactions and sensitive data are integral to daily operations (Olson & Morris, 2023). The increase in cybercrime, such as data breaches and ransomware at...

Read more

33. An Exploration of E-Commerce Security Vulnerabilities and Fraud Prevention Techniques: A Study of Online Retailers in Kano State

Background of the Study

The growth of e-commerce has revolutionized retail, providing convenience and accessibility to consumers. However, it has also exposed online retailers to security vulnerabilities, including phishing attacks, payment fraud, and data breaches (Ibrahim & Olayem...

Read more

34. An Assessment of Cybersecurity Challenges in Digital Real Estate Transactions in Niger State

Background of the Study
The digitalization of real estate transactions has revolutionized the industry, offering efficiency, convenience, and broader access to properties for both buyers and sellers. However, this transition has brought significant challenges, particularly...

Read more

35. Design and Implementation of a Virtual Private Network (VPN) for University of Jos, Plateau State

Background of the Study
In recent years, universities have increasingly relied on secure network communication to protect sensitive academic and administrative data. The University of Jos, Plateau State, faces challenges related to the security of its network infrastructur...

Read more

36. Exploring the Impact of Bring Your Own Device (BYOD) Policies on Network Security in Federal University, Lokoja, Kogi State

Background of the Study
The Bring Your Own Device (BYOD) trend has become increasingly popular in educational institutions as students and staff prefer to use their personal devices to access university networks and resources. Federal University, Lokoja, Kogi State, is no...

Read more

37. Enhancing Data Security through Encryption Techniques in Federal University, Kashere, Gombe State

Background of the Study
Data security is one of the most critical concerns for academic institutions, especially as they rely more on digital tools for education, research, and communication. Federal University, Kashere, Gombe State, faces increasing threats to its sensiti...

Read more

38. Design and Implementation of a Secure File Sharing System for Federal University, Kashere, Gombe State

Background of the Study
In educational institutions like Federal University, Kashere, Gombe State, secure file sharing is essential to protect sensitive academic, administrative, and research data. The university’s network is used extensively for file transfers betwe...

Read more

39. Comparative Study of Network Security Protocols in Federal University, Gashua, Yobe State

Background of the Study
In the digital age, universities are increasingly relying on online platforms for educational and administrative functions, making network security an urgent concern. Federal University, Gashua, Yobe State, like many educational institutions, faces...

Read more

40. Design and Implementation of a Network Backup Solution for Federal University, Dutsin-Ma, Katsina State

Background of the Study
In a university environment, critical data such as research papers, student records, and administrative documents are continuously generated and accessed across multiple systems. As educational institutions increasingly rely on digital systems for d...

Read more

41. Implementation of Secure Remote Access Solutions in Federal University, Dutsin-Ma, Katsina State

Background of the Study
The need for secure remote access to university networks has grown with the increasing trend of remote learning, telecommuting, and the digitalization of university services. Federal University, Dutsin-Ma, Katsina State, has seen a rise in the numbe...

Read more

42. Design and Implementation of a Network Security Policy for Federal University, Kashere, Gombe State

Background of the Study
In an increasingly digital world, network security has become paramount to safeguarding sensitive information against unauthorized access, cyber threats, and data breaches. Federal University, Kashere, Gombe State, like other academic institutions,...

Read more

43. Comparative Study of Network Encryption Standards in Federal University, Gashua, Yobe State

Background of the Study
Network encryption is essential for safeguarding sensitive data transmitted over a network, ensuring confidentiality and protecting against unauthorized access. Federal University, Gashua, Yobe State, like many academic institutions, relies heavily...

Read more

44. Design and Implementation of a Secure Network Infrastructure for E-Library Services in Federal University, Kashere, Gombe State

Background of the study:
In the digital age, e-libraries have become essential components of academic institutions, providing easy and efficient access to educational resources. However, ensuring the security of these e-libraries is paramount due to the increasing risks po...

Read more

45. An Investigation into the Use of Virtual Private Networks (VPN) for Secure Remote Access in Federal University, Wukari, Taraba State

Background of the study:
The use of Virtual Private Networks (VPNs) has grown significantly in recent years as organizations and institutions look for secure methods of enabling remote access to their network resources. In the context of universities, VPNs are particularly...

Read more

46. Evaluation of Network Security Threats Associated with Cloud Computing in Federal University, Birnin Kebbi, Kebbi State

Background of the study:
Cloud computing has revolutionized the way academic institutions manage and store data, enabling universities to scale their resources efficiently and cost-effectively. With cloud computing, Federal University, Birnin Kebbi, Kebbi State, has been a...

Read more

47. Comparative Study of Secure Data Transmission Techniques in Federal University, Lokoja, Kogi State

Background of the Study

Data transmission security is a critical aspect of modern network infrastructure, particularly in academic institutions that handle vast amounts of sensitive data, including student records, research outputs, and administrative c...

Read more

48. Design of a Secure Data Storage Network for Research Institutions in Federal University, Birnin Kebbi, Kebbi State

Background of the Study

Research institutions generate and store large volumes of sensitive data, including experimental results, intellectual property, and confidential academic records. The security of this data is paramount to maintaining research in...

Read more

49. Analysis of Secure Email Communication Techniques in Federal University, Gusau, Zamfara State

Background of the Study

Email communication remains one of the most widely used means of digital correspondence in academic institutions. However, it is also a major attack vector for cyber threats such as phishing, malware distribution, and email spoof...

Read more

50. Evaluation of Secure Cloud Storage Solutions in Federal University, Birnin Kebbi, Kebbi State

Background of the Study

Cloud storage solutions have revolutionized data management in academic institutions, offering scalability, remote access, and cost-effectiveness (Ogunleye & Okon, 2024). However, concerns over data security, unauthorized acc...

Read more
whatsapp