Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models have led in a slew of novel retail payment methods. These deve...
Changing technology, economic advancement, and the desire to effectively fulfill the functions of money have all spurred monetary changes throughout history. These developments point to substantial changes in the retail payment environment, including a drop in cash usage. Digital money was born a...
Background of the study
Throughout history, people have exchanged products and services via a number of techniques and channels. Many of these methods and materials, such as metal coins or paper money, are typically physical.
Without a questio...
Background of the study
Changing technology, economic advancement, and the desire to effectively fulfill the functions of money have all spurred monetary changes throughout history. These developments point to substantial changes in the retail payment e...
Background of the study
Without a doubt, the global financial system is embracing the current technological transformation from physical currency to practically virtual currencies. In recent years, rapid technological innovation and new business models...
Background of the study
Many millions, if not billion of people will be able to use a range of convenient, accessible, and dependable financial instruments for the first time in the not-too-distant future, regardless of their proximity to tradition...
Background of the study
Inflation is a term used to describe the rate at which the price of goods and services rises over time. Inflation impacts not only the cost of life – items like transportation, power, and food – but also interest rate...
Background of the study
The promotion of cashless policies has become a driving factor for global economies to investigate currency digitalization as it fast tracks online transactions. Various uses of e-transaction, includin...
Background of the study
Banks are a vital part of every economy. It is the driving force behind society and economic progress. The importance of banking services to any economy's growth and development cannot be overstated. Prior to the introduction...
Background of the study
A bank is a financial organization that collects deposits and puts those deposits into lending activities, either directly or through capital markets (Uremadu, S. 2012). Customers with capital shortages are linked to customers wi...
Background of the study
The notion of electronic banking was born as a result of technological improvement in the banking system. Customers no longer need to visit a physical financial institution to complete a transaction; instead, they can do it from...
INTRODUCTION
In the past, security was simply a matter of locking the door or storing files in a locked filing cabinet or safe. Today, paper is no longer the only medium of choice for housing information. Files are stored in computer databases as well as file cabinets....
Abstract
The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...
Introduction
An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...
BACKGROUND OF THE STUDY
The ongoing dilemma of digital age is balancing convenience against security. Security is a system safeguards for protecting information technology against disasters, system failure, and an unauthorized access that can result in damage, loss or e...
Statement of the Problem
The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system:
ABSTRACT
This study presents the development of an improved application specific tunnelling protocol selection scheme (iASTPSS) for site-to-site virtual private network (VPN). The aim is to develop an improved tunnelling protocol selection scheme for site to site VPN that is application...
STATEMENT OF THE PROBLEM
The problem is security. The password method used in almost all commercial operating systems is probably not very strong against a sophisticated or unsophisticated attacker.
The choice of data encryption comes next in...
ABSTRACT
Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are di...
ABSTRACT
Website fingerprinting is a passive network traffic analysis technique which enables an adversary to identify the website a user visited despite encryption and the use of privacy services such as Tor. Several website fingerprinting defenses built on top of Tor have been put for...
ABSTRACT
Over the years, the issue of banking fraud has become a very huge problem in the banking system of today. The percentage of banking fraud has risen greatly day-by-day by the cyber criminals coming up with different strategies such as cloning SMS and hacking into the database of...
ABSTRACT
With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to th...
ABSTRACT
The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...
Background of the study
Cryptography has a long and intricate history that intertwines with the development of number theory. From the ancient ciphers of Julius Caesar to the complex algorithms used in modern-day encryption, the evolution of cryptograph...
Abstract: AN ASSESSMENT OF CYBERCRIME AND DIGITAL FORENSIC ACCOUNTING TECHNIQUES
This study assesses the effectiveness of digital forensic accounting techniques in combating cybercrime in the financial sector in Lagos. The objectives are to evaluate the effectiveness of various digital...
Background of the Study
The rise of digital technologies and financial innovations, particularly in the fintech industry, has transformed the landscape of financial transactions in Nigeria. However, the rapid growth of these technologies has also led to increased vulner...
Background of the Study
Technology plays a crucial role in combating financial fraud by providing advanced tools for fraud detection, prevention, and reporting. Interswitch, a leading technology-driven financial services company in Nigeria, has pioneered innovations suc...
Background of the Study
In an era of digital banking, the security of data is paramount, especially for financial institutions like microfinance banks that deal with sensitive customer information and financial transactions. Cybersecuri...
Background of the Study
As the frequency and sophistication of cyber-attacks continue to rise globally, cybersecurity has become a critical concern for financial institutions, particularly banks. In Kogi State, where digital banking adoption is increasing, cybersecurity...
Background of the Study
Digital identity management has become a cornerstone of modern cybersecurity, particularly for institutions like banks that handle sensitive personal and financial information (Nash, 2023). Effective digital identity management solutions (DIMS) e...
Background of the Study
E-commerce platforms have experienced significant growth in recent years, providing consumers with convenient ways to shop online. However, this growth has also attracted cybercriminals seeking to exploit security vulnerabilities, leading to frau...
Background of the Study: Cybersecurity has become an essential concern for businesses, particularly in the fintech sector, where digital transactions and sensitive data are integral to daily operations (Olson & Morris, 2023). The increase in cybercrime, such as data breaches and ransomware at...
Background of the Study
The growth of e-commerce has revolutionized retail, providing convenience and accessibility to consumers. However, it has also exposed online retailers to security vulnerabilities, including phishing attacks, payment fraud, and data breaches (Ibrahim & Olayem...
Background of the Study
The digitalization of real estate transactions has revolutionized the industry, offering efficiency, convenience, and broader access to properties for both buyers and sellers. However, this transition has brought significant challenges, particularly...
Background of the Study
In recent years, universities have increasingly relied on secure network communication to protect sensitive academic and administrative data. The University of Jos, Plateau State, faces challenges related to the security of its network infrastructur...
Background of the Study
The Bring Your Own Device (BYOD) trend has become increasingly popular in educational institutions as students and staff prefer to use their personal devices to access university networks and resources. Federal University, Lokoja, Kogi State, is no...
Background of the Study
Data security is one of the most critical concerns for academic institutions, especially as they rely more on digital tools for education, research, and communication. Federal University, Kashere, Gombe State, faces increasing threats to its sensiti...
Background of the Study
In educational institutions like Federal University, Kashere, Gombe State, secure file sharing is essential to protect sensitive academic, administrative, and research data. The university’s network is used extensively for file transfers betwe...
Background of the Study
In the digital age, universities are increasingly relying on online platforms for educational and administrative functions, making network security an urgent concern. Federal University, Gashua, Yobe State, like many educational institutions, faces...
Background of the Study
In a university environment, critical data such as research papers, student records, and administrative documents are continuously generated and accessed across multiple systems. As educational institutions increasingly rely on digital systems for d...
Background of the Study
The need for secure remote access to university networks has grown with the increasing trend of remote learning, telecommuting, and the digitalization of university services. Federal University, Dutsin-Ma, Katsina State, has seen a rise in the numbe...
Background of the Study
In an increasingly digital world, network security has become paramount to safeguarding sensitive information against unauthorized access, cyber threats, and data breaches. Federal University, Kashere, Gombe State, like other academic institutions,...
Background of the Study
Network encryption is essential for safeguarding sensitive data transmitted over a network, ensuring confidentiality and protecting against unauthorized access. Federal University, Gashua, Yobe State, like many academic institutions, relies heavily...
Background of the study:
In the digital age, e-libraries have become essential components of academic institutions, providing easy and efficient access to educational resources. However, ensuring the security of these e-libraries is paramount due to the increasing risks po...
Background of the study:
The use of Virtual Private Networks (VPNs) has grown significantly in recent years as organizations and institutions look for secure methods of enabling remote access to their network resources. In the context of universities, VPNs are particularly...
Background of the study:
Cloud computing has revolutionized the way academic institutions manage and store data, enabling universities to scale their resources efficiently and cost-effectively. With cloud computing, Federal University, Birnin Kebbi, Kebbi State, has been a...
Background of the Study
Data transmission security is a critical aspect of modern network infrastructure, particularly in academic institutions that handle vast amounts of sensitive data, including student records, research outputs, and administrative c...
Background of the Study
Research institutions generate and store large volumes of sensitive data, including experimental results, intellectual property, and confidential academic records. The security of this data is paramount to maintaining research in...
Background of the Study
Email communication remains one of the most widely used means of digital correspondence in academic institutions. However, it is also a major attack vector for cyber threats such as phishing, malware distribution, and email spoof...
Background of the Study
Cloud storage solutions have revolutionized data management in academic institutions, offering scalability, remote access, and cost-effectiveness (Ogunleye & Okon, 2024). However, concerns over data security, unauthorized acc...