Get the complete project »
- The Complete Research Material is averagely 65 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
Therefore the acquisition of this latest gadgets in business goes long as toward keeping you a step ahead your competitor therefore most of the new banks being established go straight into bank securing and computerization of fire wall.
In conclusion, the reality of this project work is described as distributed computing in bank security processing that is the computerization of bank security and fire wall in banking operation particularly in area of banking security.
Table of content
1.1 Back ground of study
1.2 Statement of the problem
1.3 Objectives of the study
1.4 Significance of the study
1.5 Scope of the study
1.6 Limitation of the study
1.7 Definition of terms
2.0 LITERATURE REVIEW
2.4 Types of network
2.5 Network and banking
2.6 Advantages and disadvantages of net work
2.7 Security concepts
2.8 Network security
2.9 Mode of data transmission
2.10 Fire walls its types components and techniques
3.0 SYSTEM INVESTIGATION ANALYSIS AND DESIGN OF 1/0 FORMS
3.2 System investigation
3.3 System analysis
3.4 Designing of input / output forms
3.5 Research methodology
3.6 Sources of data
3.7 System proposal
3.8 Objective of the system
4.0 SYSTEM DESIGN
4.2 Programming testing implementation and hand-our change over
4.3 Programming and testing
4.5 Handover changing over
5.0 SUMMARY RECOMMENDATION AND CONCLUSION
The interconnection of computer with other related office equipment are finding increasing application in almost all field of human endeavor most especially the financial.
sector. More and more banks are introducing the use of computer
networks in their establishment. These provide for easy access to the
information and services available in the organization.
Because of the high value of information, organizations now
classify their data as well as putting a lot of effort to safeguard it.
Networking is the vehicle for sharing information where as network
security is a way to protect the information, information sharing cannot
be constrained by physical or geographical location and today’s
information has been made accessible to all by means of global network.
For an organization to become parts of this global network, it first
need to have his own Local area network (LAN), which is then connected
to the internet by means of a Wide area network (WAN). Computer security
focuses on two main problems
a. How to protect the physical equipment of the computer.
b. How to protect against unauthorized use of the
Computer faculties by intruders. The objective of network security is to control access to corporate and government data residing on network services or transmitted over the LAN or WAN
1.1 BACKGROUND OF STUDY
Diamond Bank Nigeria limited was established with the aim of providing banking services to the general public. It is first growing commercial bank incorporate with headquarter and about 8 or more branches scattered across the country, which included Imo, Abia, Calabar and Ibadan etc with a staff strength of more than 500 workers, they provide banking service to the public which include
a. The handling of cash and provision of bank drafts
b. The provision of facilities for the safe keeping of
Important document and title delds.
c. The lending of money in the form of loans and
d. The management of customers’ investment such as the
Purchase of stocks and shares and the receipts of periodic dividends.
e. The transfer of funds to other places periodically
1.2 STATEMENT OF THE PROBLEM
Diamond bank Nigeria limited has a large volume of information, which it has to handle efficiently in other to evolve efficiently corporate management and improved customer services. The information needed to carry out operation geared toward customer satisfaction must be highly secured and transmitted properly too. Since the banks uses computer network in their activities, there are bound to be threats to security which hinders work progress in the organization, once the organization launches it presence in the internet.
Most banks lack awareness on how a network can be implemented, secured and maintained. Threats to network security are sometimes difficult to track and it won’t be easy to refuse the request of the attackers. Without refusing legitimate request for services. This attack comes from any connection that the bank has with the outside world, which included dial up moderns, and internet connection. So in order to adequately address security all possible avenues of entry must be identified and evaluated, also the security of every point must be consistent with stated policy on acceptable risk levels.
1.3 OBJECTIVE OF THE STUDY
Networking is the backbone of accessing vital information the world has becomes a global village, sharing everything through networking. Networks requires a high level of security, which involves the technical and administrative safeguards required to protect a computer based system (hardware, personnel data) against the major hazards to which most computer system are exposed and to control accessed to information. The work is aimed at defining/providing a security system that will keep unauthorized uses from the protected areas of the network. This system will also prohibit potentially vulnerability services from entering or leaving the network. The system will also provide a location for monitoring security related events and adults as well as the overall security management of the network.
1.4 SIGNIFICANCE OF THE STUDY
a. Network security and fire walls are useful in banking sectors and in their services
b. It is useful to the banks in other sectors who would wish to use network security and firewall in their banks.
c. It shows need for security in banking sectors.
1.5 SCOPE OF THE STUDY
This study presents an overview of security system network and firewalls its highlights are on firewalls. Risks threats and vulnerability of network. It also concentrates on design of security system and network types.
1.6 LIMITATION OF THE STUDY
This research was limited by the shortness of time giving rise to the limited study of network security and firewalls. Also the finance to embarked upon a higher level of research was not available. The bank on its part did not give out much information that would have really aided the writing of this work due to some security reasons.
Additionally, this research was carried out at the Owerri branch office of diamond bank. Therefore the research was based on the branch section and not from the center.
1.7 DEFINITION OF TERMS
Network: Network in computing a number of computer and other devices that are connected together so that equipment and information can be snared.
Security: These are activities that involves protecting a building or person against attack danger hazards
Fire wall: Fire wall in computing is a part of a computer system
that is designed to prevent people from getting at information without
authority. But still allows them to received information that is sent to
Computer: Computer is an electronic device that accept data,
processes the data and gives information under automatic control
Bank: This is an organization that provides various financial service e.g. keeping or lending money.
Personnel: Person who manage, design program, control or operate
an information processing system and maintain access to the network.
Policy: This layer defines the umbrella of the security program. It defines the policies of the organization without a complete, effective and well implemented policy the security program cannot be complete.
LAN: LOCAL AREA NETWORK
MAN: METROPOLITAN AREA NETWORK
WAN: WIDE AREA NETWORK
E-MAIL: ELECTRONIC MAIL
FAX: FACSITAILE DOCUMENT TRANSMISSION
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» ABSTRACT There is a wide range of problems that can befall a telecom system, from static on calls to an inability to complete calls to dropped calls. ...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.0 Introduction The emergency ambulance dispatch system or computer aided dispatch system (CAD) is a web based application t...Continue Reading »
» CHAPTER ONE 1.1. INTRODUCTION A recruitment management system is a comprehensive tool to manage the entire recruitment processes of an organization. I...Continue Reading »
» CHAPTER ONE 1.0 INTRODUCTION A blood donation occurs when a person voluntarily has blood drawn and used for transfusions and/or made into biopharmaceu...Continue Reading »
» CHAPTER ONE INTRODUCTION The industrial batch counter is an electronic and electrical device that handles the counting and controls the flow of indivi...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Evaluation of student academic performance is called grading. Academic performance...Continue Reading »
7. DESIGN AND IMPLEMENTATION OF ONLINE STUDENT ADMISSION AND DOCUMENT VERIFICATION SYSTEM (A CASE STUDY OF UNIVERSITY OF UYO)» ABSTRACT Forgery has long crept into our educational system and, counterfeit and forged admission status / certificate and document have upper hand in...Continue Reading »
8. Design And Implementation Of Computerized Directory Of Business Premises (A Case Study Of Enugu Urban)» Abstract The software package used in this protect is quick Basic which centered on soloing the problem of relational business activities arising from...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 Background of the Study This research paper finds the . Today’s society has seen an increase in the use of computer...Continue Reading »
10. DESIGN AND IMPLEMENTATION OF A COMPUTERIZED DOCUMENTATION SYSTEM OF COURT PROCEEDINGS (A CASE STUDY OF FEDERAL HIGH COURT ENUGU STATE)» ABSTRACT As the complexity and degrees of crimes widen, system using new technology will have to be utilized to aid lawyers etc to fight this tends. J...Continue Reading »