Page Length: 77

Size: 1323 KB

Format: PDF & Word

5,000.00

ABSTRACT

The research work examined the manual operation of manual banking system in Aguleri Micro Finance Bank, Aguleri where it was observed that there is absence of an intrusion detection and prevention system, which makes it possible for intruders to gain access to sensitive information stored in the organization, and low level of file security, loss of file/documents as a result of poor files storage and data redundancy during recording of customers’ information. An intrusion detection and prevention system uses information technologies and control system to reduce the need for human work in service rendering, decrease the need for human sensory and mental requirement and perform tasks that are beyond human capabilities in terms of size and speed. The Methodology used in writing this study is the Object Oriented Analysis and Design Methodology (OOADM). The front end was designed with visual basic.net while the back end used Microsoft Access. An intrusion detection and prevention system will provide a new way that will curb some of the problems of Aguleri Micro Finance Bank, Aguleri and improve the standard with reliable banking system for customers and secure customers’ information.

 

 

 

 

 

 

 

 

https://rufortouthee.com/4/7692130

 

 

 

 

 

 

 

 

 

TABLE OF CONTENT

Title Page

Certification                                                                                                                            i

Approval Page                                                                                                                        ii

Dedication                                                                                                                              iii

Acknowledgement                                                                                                                  iv

Abstract                                                                                                                                  v

Table of Content                                                                                                                     vii

 

CHAPTER ONE

  • Introduction                                                                                                                     1

1.1  Background of Study                                                                                                      1

1.2  Observation of the System                                                                                               2

1.3 Scope of Study                                                                                                                 3

1.4  Significance of Study                                                                                                      3

1.5  Statement of Problem                                                                                                      4

1.6  Limitations of Study                                                                                                        4

1.7 Definition of Terms                                                                                                           5

CHAPTER TWO

2.0 Literature Review                                                                                                             7

CHAPTER THREE

  • Methodology                                                                                                                   13

3.2 System Analysis                                                                                                                18

3.3 Data Collection                                                                                                                 19

3.4 Organization and its environment                                                                                     20

3.5 Modus Operandi of the Present System                                                                           21

3.5.1 Input Analysis                                                                                                                21

3.5.2 Process Analysis                                                                                                            23

3.5.3 Output Analysis                                                                                                             25

3.5.4 Data Flow Diagram of the Present System                                                                    26

3.6 Problems of the Present System                                                                                       28

3.7 The Proposed System                                                                                                       28

3.8 High Level Model of the Proposed System                                                                      29

 

CHAPTER FOUR

4.0 System Design                                                                                                                  31

4.1 Objectives Of The Design                                                                                                31

4.2 Dataflow Diagram of the New System                                                                             31

4.3 Database Specification                                                                                                     35

4.4 Program Module Specification                                                                                         36

4.5 Input and Output Specification                                                                                         38

4.6 Algorithms                                                                                                                        43

4.7 System Flowchart                                                                                                             44

4.8 Program Flowchart                                                                                                           45

4.9. Data Dictionary                                                                                                                50

4.10 Choice of Programming Language Platform                                                                  52

 

CHAPTER FIVE

5.0 System Implementation and Documentation                                                                   53

5.1 System Implementation                                                                                                    53

5.2 Hardware Requirements                                                                                                   53

5.3 Software Requirements                                                                                                     54

5.4 Installation Arrangements                                                                                                 54

5.5 Testing                                                                                                                              54

5.6 Training Arrangements                                                                                                     55

5.7 Conversion Arrangements                                                                                                56

5.8 System Documentation                                                                                                     57

 

CHAPTER SIX

6.0 Summary, Conclusion and Recommendations                                                                 58

6.1 Summary                                                                                                                           58

6.2 Conclusion                                                                                                                        58

6.3 Recommendation                                                                                                              59

REFERENCES                                                                                                                     60

APPENDIX                 

 

CHAPTER ONE

INTRODUCTION

1.1 Background of the Study

Data processing, being the main activity that a computer performs, refers to the manipulation of codes, handling and processing of data to provide reasonable information for human needs, computer is the machine designed to process these and to assist man as in the case vehicle s which assist the legs, binoculars and telescope to assist the eyes and microphones which assist the mouth (voice), computers are designed to assists man’s brain. These machines are equally essential to man’s day to day activities though their importance cannot be compared to that of computer. Computers aid man in key fields of endeavors and professionalism, from educational institution to medical expertise and diagnosis, security, law and order and even the government. Banking and finance and other economic operation cannot be explored to the fullest where computers are kept at bay. These fields all rely on information to operate and function smoothly and for information to be gotten on a steady, secured and reliable frequency, stored and processed without much stress or mistake, computer is introduced as it is a machine known for its efficiency and capability amongst its numerous qualities (Needles, & Marian, 2018).

This project is focused majorly on the use of highly secured software for banks. The use of Anti-Malware software for customer’s savings account details and transactions (deposit and withdrawal) which helps to enhance the data security in the Bank. Customer care is a crucial element of business success (Needles, & Marian, 2018). Every time you have contact with your customers you have an opportunity to improve your reputation with them and increase the likelihood of further sales. From your telephone manner to the efficiency of your order-fulfillment systems, almost every aspect of your business affects the way your customers view your business.

What motivated the researcher to write this project is because of some reasons that was observed in the existing system. Some of the challenges are; firstly, absence of an intrusion detection and prevention system, which makes it possible for intruders to gain access to sensitive information stored in the organization, lack of Data integrity: due to the manual mode of keeping record, Intruders enjoys ease access to the record, altering the sensitive information, and finally, data insecurity: Insecurity of customer information causes data loss. Because of the problems observed in the existing system, design and implementation of an Intrusion detection and prevention system for banking system is initiated to ease all problems.

 

 

  • Statement of the Problems

A vast number of people are vulnerable to security breaches but do not know how they can avoid it. Currently, there are various IDPS known, used, and actively being built. For any big company, common user, or vendor, a problem arises when they want to decide upon which IDPS should be implemented on their network or host as per their requirements and the features of the IDPS. Therefore, awareness and a contrast on an IDPS and its features must be well known to understand and compare different security systems available.

The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system;

  1. Absence of an intrusion detection and prevention system, which makes it possible for intruders to gain access to sensitive information stored in the organization.
  2. Low level of file security.
  • It is very cumbersome to manually reconcile all customer information from different files sources into their work sheet.
  1. Data insecurity: Insecurity of customer information causes data loss.
  2. Lack of Data integrity: Due to the manual mode of keeping record, Intruders enjoys ease access to the record, altering the sensitive information.

 

 

 

  • Aim and Objectives of the Study

The aim and objective of this research work is to design and implement an Intrusion Detection Prevention system for banking system that will work towards the elimination of ineffective mode of operation in the existing (manual banking) system.

The objectives of this study are;

  1. To design a system that will encrypt information pertaining to customers to prevent intrusion.
  2. To create awareness of IDS/IPS.
  • To develop a system that will require an encryption key before bank transaction information can be viewed.
  1. To implement a system that will prevent disclosure of customers’ data to fraudsters by utilizing cipher text.
  2. To ensure easy flow of information between the management and their customers.

 

 

1.4 Significance of the Study

The significance of the study is linked to the key attributes of a computer system i.e. data security, data integrity, speed accuracy and reliability. Banks are always expected to compute and manipulate a customer’s account details in a short time frame and with little or no mistake since there are other customers waiting to be attended to. Thus the significance of this study is to increase the security level, speed and accuracy at which customers are tended reliably, preventing unauthorized individuals (intruders) from gaining access to the financial information of customers, tightening the security level of the organization, and the study will reveal how encryption can be applied to prevent intruders from gaining access to customer information, and also the study will serve as a useful reference material to other researchers seeking related information.  Afterwards, further development can be made on the project work in accordance to the rapid development in information technology in the near future.

 

 

 

1.5 Scope of the Study

The scope of this project is limited to the development of an Intrusion Detection, Prevention Mechanism, Aguleri Micro Finance Bank, Aguleri, considering the data security and data integrity for customers’ record. It is limited to the use of cipher/ code text encryption to prevent intruders from gaining access to vital information of customers because it contains a form of the original plaintext that is unreadable by a human or computer without a proper cipher to decrypt it. It is expected that this project will be successful enough to draw interest from other business companies.

 

1.6 Limitations of Study

Some of the constraints that may have in one-way or another affected the outcome of this work include:

  1. Lack of adequate fund to finance the project: this was one of the limitation to this work because much money is needed to carry out a detailed research work which is not easily borne by every student.
  2. The limited knowledge of ASP.net and Visual Basic programming was great challenge to this project. However, more research was made to complete this project successfully.

1.7 Definition of Terms

Analyst: This is a person or professional who studies the problem encountered by a system and creates means of solving them by introducing a better system.

Banking: This is referred to as the act of keeping valuables (money, documents, properties, ornaments) in a bank for safe keeping.

Business: this is the activity of making one’s living or making money by producing or buying and selling products (such as goods and services). Simply put, it is “any activity or enterprise entered into for profit (Needles, & Marian, 2018).

Computer: It is an electronic device operating the control of instructions stored in its memory that can accept data (input) manipulate the data according to a specified rules (processing) produces result output and stores the result for future use.

Customer: A customer is a person or organization who patronizes a bank for safe keeping of valuables.

Data processing: is defined as the entire process of converting or manipulating data into definite meaningful information (Adigwe, & Okoye, 2019).

Data: It is the facts collected for decision making they are facts that are kept to be processed to get more information.

Database Management System (DBMS): it is software which controls the flow of data and checks and checks on how data are stored.

Database: is an organized /unique collection of related files. It is a collection of schemas, tables, queries, reports, views and other object.

Deposit: Money placed in an account.

Detection: this is the extraction of particular information from a larger stream of information without specific cooperation from or synchronization with the sender.

Electronic Data Processing Equipment (EDP): it is a machine that performs the work of data manipulation.

Finance: the management of money and other assets.

Intrusion Detection System (IDS): is a software or hardware component that automates the intrusion detection process. It is designed to monitor the events occurring in a computer system and network and responds to events with signs of possible incidents of violations of security policies.

Intrusion Prevention System (IPS): on the other hand, is the technology of both detecting of intrusion or threat activities and taking preventive actions to seize them. It combines the knowledge of IDS in an automated manner.

Intrusion: It is an illegal act of entering possession of another’s property.

Management Information System (MIS): Information system that generates accurate timely and organized information so that manager and other user can make decision, solve problem supervise activities and track progress.

Password: A special code used by user to gain access to the database or a research.

Prevention: Maintenance performed to stop fault occurring or developing into major detects.

Security: This helps to prevent unauthorized users from illegally accessing certain data in the database, it protects your data/ files.

Software: These are set of logically related instructions given to the computer to perform some specific task.

System: Is the collection of hardware and software, data information procedure and people.

Transaction: it is a business event that has a monetary impact on an entity’s financial statements, and is recorded as an entry in its accounting records.

Withdrawal: Receiving from a deposit made.

DOWNLOAD COMPLETE WORK

DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.

WeCreativez WhatsApp Support
Administrator (Online)
Hello and welcome. I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.