Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models have led in a slew of novel retail payment methods. These deve...
Changing technology, economic advancement, and the desire to effectively fulfill the functions of money have all spurred monetary changes throughout history. These developments point to substantial changes in the retail payment environment, including a drop in cash usage. Digital money was born a...
Background of the study
Throughout history, people have exchanged products and services via a number of techniques and channels. Many of these methods and materials, such as metal coins or paper money, are typically physical.
Without a questio...
Background of the study
Changing technology, economic advancement, and the desire to effectively fulfill the functions of money have all spurred monetary changes throughout history. These developments point to substantial changes in the retail payment e...
Background of the study
Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models...
Background of the study
Many millions, if not billion of people will be able to use a range of convenient, accessible, and dependable financial instruments for the first time in the not-too-distant future, regardless of their proximity to tradition...
Background of the study
Inflation is a term used to describe the rate at which the price of goods and services rises over time. Inflation impacts not only the cost of life – items like transportation, power, and food – but also interest rate...
Background of the study
The promotion of cashless policies has become a driving factor for global economies to investigate currency digitalization as it fast tracks online transactions. Various uses of e-transaction, includin...
Background of the study
Banks are a vital part of every economy. It is the driving force behind society and economic progress. The importance of banking services to any economy's growth and development cannot be overstated. Prior to the introduction...
Background of the study
A bank is a financial organization that collects deposits and puts those deposits into lending activities, either directly or through capital markets (Uremadu, S. 2012). Customers with capital shortages are linked to customers wi...
Background of the study
The notion of electronic banking was born as a result of technological improvement in the banking system. Customers no longer need to visit a physical financial institution to complete a transaction; instead, they can do it from...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
Abstract
The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...
Introduction
An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...
BACKGROUND OF THE STUDY
The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or e...
Statement of the Problem
The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:
ABSTRACT
This study presents the development of an improved application specific tunnelling protocol selection scheme (iASTPSS) for site-to-site virtual private network (VPN). The aim is to develop an improved tunnelling protocol selection scheme for site to site VPN that is application...
STATEMENT OF THE PROBLEM
The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.
The choice of data encryption comes next in...
ABSTRACT
Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...
ABSTRACT
Website fingerprinting is a passive network traffic analysis technique which enables an adversary to identify the website a user visited despite encryption and the use of privacy services such as Tor. Several website fingerprinting defenses built on top of Tor have been put for...
ABSTRACT
Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...
ABSTRACT
With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to th...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
Background of the study
Cryptography has a long and intricate history that intertwines with the development of number theory. From the ancient ciphers of Julius Caesar to the complex algorithms used in modern-day encryption, the evolution of cryptograph...
Abstract: AN ASSESSMENT OF CYBERCRIME AND DIGITAL FORENSIC ACCOUNTING TECHNIQUES
This study assesses the effectiveness of digital forensic accounting techniques in combating cybercrime in the financial sector in Lagos. The objectives are to evaluate the effectiveness of various digital...