• Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service

  • CHAPTER ONE -- [Total Page(s) 2]

    Page 2 of 2

    Previous   1 2
    • The objective of this work is to develop a system that should be able to;
      ➢    Detect active users.
      ➢    Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.
      ➢    Monitor the daily activities of every user in a network in real time.
      ➢    Has a good memory management for efficient carrying out of activities.
      1.4    Significance of Study
      Therefore some of the significance and benefits of this work include:
      ➢    Increased employers loyalty: -What ultimately creates the employers loyalty is meeting and exceeding their expectation.
      ➢    Maintaining system integrity.
      ➢    Staying current on work status so as to know how well the organisation is going.
      ➢    Ensure proper handling of investigation in computing: This is the reason why we need a careful, methodical process for gathering digital data in the first place; and this is why we need network activity monitoring system.
      ➢    Increased employer’s retention:-The employees are an investment. Generally, it takes nine to twelve months or longer before an employee is a productive asset to a company. If an employee leaves after a year or two, the company has lost most of its investment.
      ➢    Information empowered decision making: -Most managers, executives and employers make decisions based upon all relevant information. There are some actions that can have a profound effect on corporate decision making; those actions are more easily justifiable when you have easily accessed the users system.
      1.5    Scopes of the Study
      Although a network activity monitoring system involves many things and activities that can be run within it, yet due to lack of time and space, we were not able to use this software in other operating systems apart from windows operating system (that is from windows 7 to windows operating system of higher versions). Furthermore this work did also not involve internet connectivity as well as detection of virus in a network.
      1.6    Limitations of the Study
      During the course of this study, many things militated against its completion, some of which are;
      ➢    Lack of finance
      ➢    Refusal of the Benue State Internal Revenue Service Makurdi, to give detailed answers and in some cases no answer at all to some questions.
      ➢    This project is limited to all the data associated with the information gotten from the Federal Inland Revenue Service commission, and due to time factor, not all the commissions were reached for sources of data and information.
      1.7    Definition of Terms
      NAMS (Network activity monitoring system): This is the system that is used monitor the daily activity of every user on a network
      Corporate fraud: This is the fraud committed by insiders in a large, publicly traded (or private) corporation, and/or by senior executives.
      Real time: Occurring immediately, this is used for such task as navigation, in which the computer must react to a steady flow of new information without interruption.
      LAN (local area network): This is computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings.
      Corporate decision making: This is connected with a corporation, this involves the image of a company or organization where all its members involve taking critical decision making (finance/planning/strategy)
      Internal Auditor: An employee of a company charged with providing independent and objective evaluations of the company’s financial and  operational business activities, including its corporate governance. Internal auditors also provide evaluations of operational efficiencies and will usually report to the highest level of management on how to improve the overall structure and practices of the company External Auditor: An external auditor is an audit professional who performs an audit in accordance with specific laws or rules on financial statements of a company, government entity, other legal entity or organization, and who is independent of the entity being audited.

  • CHAPTER ONE -- [Total Page(s) 2]

    Page 2 of 2

    Previous   1 2
    • ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---

         

      APPENDIX A - [ Total Page(s): 4 ]Regadmin.php ... Continue reading---

         

      APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 5 ]The Pathneck technique uses a carefully constructed packet train to locate bottleneck links, making it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those properties make it attractive for both regular network users and ISP network operators.The BRoute system uses a novel concept source and sinks trees to capture end-user routing structures and network-edge bandwidth information. Equipped with path- edge ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 3 ]CHAPTER THREESYSTEM ANALYSIS AND RESEARCH METHODOLOGY3.1    IntroductionSystem analysis is the study of a system, with the view to determine the bottlenecks and desired end product and establish the most efficient method of obtaining this end (American Heritage Dictionary, 2003). It is the analysis of the requirements of a task, and expression of these tasks in a form that enables a computer to perform the task. System analysis also refers to the process through which an existing system is ex ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 7 ] ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE SUMMARY AND CONCLUSION5.1    SummaryThe topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.5.2 ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---