0704-883-0675     |      dataprojectng@gmail.com
1

1. CRITICAL INFORMATION INFRASTRUCTURE PROTECTION TECHNIQUES IMPLEMENTATION AGAINST CYBER ATTACKS USING BIG DATA ANALYTICS (A CASE STUDY OF INEC & JAMB)

Introduction

In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...

Read more

2. COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM

INTRODUCTION

The interconnection of computer with other related office equipments are finding increasing application in almost all field of human endeavour most especially the financial

 sector. More and more banks are introducing the us...

Read more

3. FINGERPRINT BASED STUDENT ATTENDANCE MONITORING SYSTEM

Background of the Study

Attendance management of students in institution can be rigorous using the conventional method of paper sheets and old file system method. Every academic institution poses some standards concerning how attendance is to be confirmed for student in...

Read more

4. COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM

OBJECTIVE OF THE STUDY

Networking is the backbone of accessing vital information the world has becomes a global village, sharing everything through networking. Networks requires a high level of security, which involves the technical and administrative...

Read more

5. COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM: A CASE STUDY OF DIAMOND BANK NIG PLC OWERRI

INTRODUCTION

The integration of computers with other relevant office equipment is finding growing use in virtually every aspect of human endeavor, but particularly in the realm of finance. The usage of computer networks is becoming increasingly commonp...

Read more

6. DEPLOYMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) IN ARCHITECTURAL COMPANIES IN NIGERIA

ABSTRACT

Architectural practice has been in existence in Nigeria for more than fifty years and the earliest introduction of computers by firms for operations began in the early 1980s. Information and communication technology (ICT) usage is inevitable in all fields of endeavours and for...

Read more

7. INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) DEPLOYMENT IN ARCHITECTURAL FIRMS IN NIGERIA

ABSTRACT

Architectural practice has been in existence in Nigeria for more than fifty years and the earliest introduction of computers by firms for operations began in the early 1980s. Information and communication technology (ICT) usage is inevitable in all fields of endeavours and for...

Read more

8. INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) DEPLOYMENT IN ARCHITECTURAL FIRMS IN NIGERIA  

ABSTRACT

Architectural practice has been in existence in Nigeria for more than fifty years and the earliest introduction of computers by firms for operations began in the early 1980s. Information and communication technology (ICT) usage is inevitable in all fields of endeavours and for...

Read more

9. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

 

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance i...

10. COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM (A CASE STUDY OF DIAMOND BANK NIG PLC OWERRI)

ABSTRACT

The degree of accidence of an organisation that services to customer such as banks security depends on speed and accuracy with the service performed in the banks which include information processing e.g. data entry. Data using sorting data, updatin...

Read more

11. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining pro...

Read more

12. The Effect of IT Outsourcing on Cost Reduction and Service Delivery: A Case Study of Insurance Firms in Kebbi State

Background of the Study

Information Technology (IT) outsourcing involves contracting external providers to handle IT-related services, such as data management, network maintenance, and software development. For insurance firms in Kebbi...

Read more

13. Design and Implementation of a Virtual Private Network (VPN) for University of Jos, Plateau State

Background of the Study
In recent years, universities have increasingly relied on secure network communication to protect sensitive academic and administrative data. The University of Jos, Plateau State, faces challenges related to the security of its network infrastructur...

Read more

14. Evaluation of Network Security Policies in Federal University, Dutse, Jigawa State

Background of the Study
Network security policies are fundamental to protecting digital resources in any organization, especially in universities, where sensitive data such as student records, research findings, and financial information is regularly transmitted and stored...

Read more

15. Exploring the Impact of Bring Your Own Device (BYOD) Policies on Network Security in Federal University, Lokoja, Kogi State

Background of the Study
The Bring Your Own Device (BYOD) trend has become increasingly popular in educational institutions as students and staff prefer to use their personal devices to access university networks and resources. Federal University, Lokoja, Kogi State, is no...

Read more

16. Development of an Intrusion Detection System for Kaduna State University, Kaduna State

Background of the Study
Cybersecurity threats in higher education institutions have grown significantly, with universities being prime targets due to their large volumes of sensitive data and open network access (Suleiman et al., 2023). Kaduna State University (KASU), loca...

Read more

17. Investigation into the Effectiveness of Firewall Configurations in Federal University, Gashua, Yobe State

Background of the Study
Firewalls are critical components of network security, acting as barriers between trusted internal networks and untrusted external networks. Federal University, Gashua, Yobe State, relies heavily on firewalls to protect its network from unauthorized...

Read more

18. Design and Implementation of a Network Monitoring Tool for Federal University, Dutsin-Ma, Katsina State

Background of the Study
Network monitoring is an essential aspect of maintaining the security, reliability, and performance of modern network infrastructures. Federal University, Dutsin-Ma, Katsina State, like many academic institutions, has a growing demand for real-time...

Read more

19. Evaluation of Network Access Control Mechanisms in Federal University, Lafia, Nasarawa State

Background of the Study
Network access control is a crucial component of network security, especially in institutions with large and diverse user bases like Federal University, Lafia, Nasarawa State. Network access control mechanisms are designed to ensure that only author...

Read more

20. Comparative Study of Network Security Protocols in Federal University, Gashua, Yobe State

Background of the Study
In the digital age, universities are increasingly relying on online platforms for educational and administrative functions, making network security an urgent concern. Federal University, Gashua, Yobe State, like many educational institutions, faces...

Read more

21. Development of a Network Security Awareness Program for Federal University, Lokoja, Kogi State

Background of the Study
As cyber threats become increasingly sophisticated, universities must ensure that both their staff and students are equipped with the knowledge and skills to safeguard sensitive information. Federal University, Lokoja, Kogi State, faces growing conc...

Read more

22. Implementation of Network Access Control Lists (ACLs) in Federal University, Kashere, Gombe State

Background of the Study
Network Access Control Lists (ACLs) are crucial components of network security used to regulate access to resources and restrict unauthorized traffic. ACLs are widely deployed in routers and firewalls to control inbound and outbound traffic based on...

Read more

23. Investigation into the Effectiveness of Network Segmentation in Federal University, Gashua, Yobe State

Background of the Study
Network segmentation is a fundamental practice in network security and management that involves dividing a larger network into smaller, isolated subnetworks (segments). Each segment can have its own set of security controls, which enhances the netwo...

Read more

24. An Investigation of Network Security Threats in Federal University, Gusau, Zamfara State

Background of the Study
The rapid growth of the internet and digital technologies has brought numerous benefits to academic institutions, but it has also exposed them to various network security threats. Universities like Federal University, Gusau, Zamfara State, are parti...

Read more

25. Enhancing Network Security through Intrusion Prevention Systems in Federal University, Kashere, Gombe State

Background of the Study
The need for effective network security measures has become more pronounced as cyber-attacks have evolved in sophistication. Institutions of higher learning, including Federal University, Kashere, Gombe State, are attractive targets for hackers due...

Read more

26. Implementation of Secure Remote Access Solutions in Federal University, Dutsin-Ma, Katsina State

Background of the Study
The need for secure remote access to university networks has grown with the increasing trend of remote learning, telecommuting, and the digitalization of university services. Federal University, Dutsin-Ma, Katsina State, has seen a rise in the numbe...

Read more

27. Design and Implementation of a Network Security Policy for Federal University, Kashere, Gombe State

Background of the Study
In an increasingly digital world, network security has become paramount to safeguarding sensitive information against unauthorized access, cyber threats, and data breaches. Federal University, Kashere, Gombe State, like other academic institutions,...

Read more

28. An Investigation of Network Traffic Anomalies in Federal University, Wukari, Taraba State

Background of the Study
Network traffic anomalies refer to unusual patterns of data flow that deviate from the normal operating behavior of a network. These anomalies can signal potential security threats, such as Distributed Denial of Service (DDoS) attacks, malware commu...

Read more

29. Design and Implementation of a Secure Network Infrastructure for E-Library Services in Federal University, Kashere, Gombe State

Background of the study:
In the digital age, e-libraries have become essential components of academic institutions, providing easy and efficient access to educational resources. However, ensuring the security of these e-libraries is paramount due to the increasing risks po...

Read more

30. An Investigation into the Use of Virtual Private Networks (VPN) for Secure Remote Access in Federal University, Wukari, Taraba State

Background of the study:
The use of Virtual Private Networks (VPNs) has grown significantly in recent years as organizations and institutions look for secure methods of enabling remote access to their network resources. In the context of universities, VPNs are particularly...

Read more

31. Evaluation of Network Security Threats Associated with Cloud Computing in Federal University, Birnin Kebbi, Kebbi State

Background of the study:
Cloud computing has revolutionized the way academic institutions manage and store data, enabling universities to scale their resources efficiently and cost-effectively. With cloud computing, Federal University, Birnin Kebbi, Kebbi State, has been a...

Read more

32. Comparative Study of Network Intrusion Detection Systems in Federal University, Gashua, Yobe State

Background of the Study:
As the number of cyber-attacks continues to increase, universities, like Federal University, Gashua, Yobe State, face an increased risk of network breaches that could compromise sensitive academic and administrative data. To safeguard these digital...

Read more

33. Implementation of Secure Network Access Control Using Biometric Authentication in Federal University, Kashere, Gombe State

Background of the Study:
Network security is an essential component of modern academic institutions, particularly for safeguarding critical resources, such as student records, research data, and administrative systems. Traditional authentication methods, like passwords and...

Read more

34. Optimization of Network Security Using Artificial Intelligence in Federal University, Birnin Kebbi, Kebbi State

Background of the Study:
The rapid digital transformation in higher education institutions has increased the reliance on networked systems for research, communication, and administration. However, this expansion has also exposed institutions like Federal University, Birnin...

Read more

35. Design and Implementation of a Next-Generation Firewall for Federal University, Dutsin-Ma, Katsina State

Background of the Study

With the increasing digital transformation in higher education institutions, cybersecurity has become a critical concern for universities. Federal University, Dutsin-Ma, relies on networked infrastructure for research, online lea...

Read more

36. Evaluation of Cyber Threat Intelligence Strategies in Federal University, Lafia, Nasarawa State

Background of the Study

Cyber threats are increasingly targeting academic institutions due to their vast digital resources and open-access networks. Federal University, Lafia, faces a growing number of cybersecurity threats, including phishing, ransomwa...

Read more

37. Comparative Study of Secure Data Transmission Techniques in Federal University, Lokoja, Kogi State

Background of the Study

Data transmission security is a critical aspect of modern network infrastructure, particularly in academic institutions that handle vast amounts of sensitive data, including student records, research outputs, and administrative c...

Read more

38. Enhancing Network Security Using Blockchain Technology in Federal University, Kashere, Gombe State

Background of the Study

With the increasing reliance on digital platforms for research, administration, and communication, universities are prime targets for cyberattacks. Traditional security measures often fail to prevent sophisticated attacks such as...

Read more

39. Exploring the Role of Ethical Hacking in Strengthening Network Security in Federal University, Wukari, Taraba State

Background of the Study

Cybersecurity threats have become a growing concern for academic institutions, with universities increasingly targeted by hackers seeking to exploit vulnerabilities. Ethical hacking, also known as penetration testing, involves us...

Read more

40. Implementation of AI-Powered Network Anomaly Detection in Federal University, Dutsin-Ma, Katsina State

Background of the Study

As cyber threats become more advanced, traditional security measures such as rule-based intrusion detection systems (IDS) are proving ineffective in identifying sophisticated attacks. Artificial intelligence (AI) has emerged as a...

Read more

41. Analysis of Secure Email Communication Techniques in Federal University, Gusau, Zamfara State

Background of the Study

Email communication remains one of the most widely used means of digital correspondence in academic institutions. However, it is also a major attack vector for cyber threats such as phishing, malware distribution, and email spoof...

Read more

42. Optimization of Virtual Local Area Networks (VLANs) for Network Security in Federal University, Lafia, Nasarawa State

Background of the Study

As academic institutions expand their network infrastructure, security becomes a primary concern. Virtual Local Area Networks (VLANs) have emerged as an effective technique for improving network security by segmenting network tra...

Read more

43. Investigation into the Effectiveness of Cybersecurity Policies in Federal University, Lokoja, Kogi State

Background of the Study

Cybersecurity policies play a crucial role in protecting institutional networks, ensuring compliance, and safeguarding sensitive information. These policies outline best practices for network security, access control, data protec...

Read more

44. Enhancing Network Security Through AI-Powered Access Control in Federal University, Dutsin-Ma, Katsina State

Background of the Study

Network security is a critical concern for universities as cyber threats continue to evolve. Traditional access control mechanisms, such as passwords and manual authentication processes, are often insufficient in preventing unaut...

Read more

45. Development of an AI-Based Malware Detection System in Federal University, Lokoja, Kogi State

Background of the Study

Cyber threats have become increasingly sophisticated, with malware attacks posing significant risks to university networks. Malware can compromise sensitive information, disrupt academic activities, and result in financial losses...

Read more

46. Implementation of Cyber Hygiene Practices in Federal University, Kashere, Gombe State

Background of the Study

With the increasing reliance on digital systems, universities must implement strong cyber hygiene practices to protect sensitive data and prevent cyber threats. Cyber hygiene refers to routine security practices that enhance onli...

Read more

47. Comparative Study of Intrusion Prevention Systems in Federal University, Lokoja, Kogi State

Background of the Study

In recent years, the prevalence of cyberattacks targeting universities has significantly increased, driven by the growing digitization of administrative and academic functions. Federal University, Lokoja, Kogi State, is not immun...

Read more

48. Implementation of Automated Network Threat Response Systems in Federal University, Dutsin-Ma, Katsina State

Background of the Study

As cybersecurity threats evolve in sophistication and frequency, universities face increasing challenges in managing and responding to network attacks. Federal University, Dutsin-Ma, Katsina State, requires an automated system th...

Read more

49. Analysis of Social Engineering Attacks on Campus Networks in Federal University, Gusau, Zamfara State

Background of the Study

Social engineering attacks, which manipulate individuals into divulging confidential information or performing actions that compromise security, are a significant threat to the networks of higher education institutions. Federal U...

Read more

50. Investigation into the Impact of 5G Networks on Higher Education Institutions in Federal University, Lokoja, Kogi State

Background of the Study

The introduction of 5G networks promises to revolutionize connectivity and data transmission speeds, which can have profound implications for the way higher education institutions conduct research, teaching, and learning. Federal...

Read more
whatsapp