• Design And Implementation Of Network Security
    [A CASE STUDY OF UBA ENUGU]

  • CHAPTER ONE -- [Total Page(s) 2]

    Page 2 of 2

    Previous   1 2
    • Access control is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticket holders should be admitted), logical resources (a bank account, with a limited number of people authorized to make a withdrawal), or digital resources (for example, a private text document on a computer, which only certain users should be able to read).  Banks are secured financial institutions. They are often housed in large buildings that are located in a commercial or residential area. Banks store money and other financial information and goods.  Money and valuables have been stored in banks since ancient times. As a result of the long history that banks have enjoyed, bank security has also been important for a long time. Some of the oldest banks in the world have the best security available. These banks include the Bank of Sweden, the Bank or England, Bank of America, and Swiss Banking.  Bank security usually includes a staff of security guards, a security system, and one or more vaults. Security guards are uniformed personnel that maintain high visibility and watch cameras and alarms. Cameras and alarms are usually top of the line systems in banks and other financial buildings. But these security elements are not exclusive to banks. Some of these elements can be found in other commercial buildings and even residential homes.    
      Basic security starts with the locks. For a high level of security, windows and doors will need the best locks. After high quality locks are installed many property owners opt for a security system or even security cameras.  Security cameras are often a small part of a larger security system. Systems often include motion detectors, alarms, sensors, and cameras. Cameras are arguably the most important because they allow the property owner to see and record everything that happens in and around their building or property.  Cameras can be installed by a professional or by a property owner. For a large and elaborate system it may be best for a professional to do the work. But for a smaller and easy layout, a property owner should have no problem installing a system by following the manufactures instructions. If he does than there is usually a local installer that can be called to help finish the job.   
      1.1    STATEMENT OF THE PROBLEM   Owing to:  
      1.    Fraudulent act of some customer/workers 
      2.    Accessing the organizational data/information unauthorized  
      3.    Sensitive nature of bank data/information  
      4.    Valuable or costly items in bank      
      5.  Increase in crime in our society   The need arise for the development of computerized NETWORK SECURITY to eliminate such problems.   1.2    PURPOSE OF STUDY  The main purpose of this project is to design a NETWORK SECURITY that will assist UBA in the area of ensuring effective security measures. 
      1.3    AIMS AND OBJECTIVES  This project will have the following aims and objectives:   Detecting security violations   Re-creating security incidents   To disallow unauthorized users   To safeguard the organizational data/information   To computerized the organizational security   To enhance the organizational security   To eliminate all forms of mistakes associated with security control              
      1.4    SCOPE OF STUDY  This research work will access the design and implementation of NETWORK SECURITY in UBA Enugu. It will look into the operations of this bank in the aspect of computerizing their security control system. 
      1.5    CONSTRAINTS  This project will be limited to the data available at hand, data outside the researcher will not be made use of.  The limitations militating against this research are financial constraints, time factor and other circumstances. 
      1.6    ASSUMPTIONS  Accuracy, efficiency and reliability is associated with Network Security.  For the purpose of this research, my assumptions can be stated as follows: 
      1.    The application of computer related garget for security control 
      2.    A computerized Network Security is effective and dependable   
      1.7    DEFINITION OF TERMS   Administration is an aspect of running the organization by devising systems  which will run smoothly.  
      2.    Client: This any process that request specific services from server processes.    
      3.    Computer: This is an electrons machine that can accept; handle and manipulate data by performing arithmetic and logic operations without human intervention usually under the control of programmes. 
      4.    Data: This is fore runner of information. It is unprocessed fact.  
      5.    Database is a collection of information that is related to a particular subject or purpose. 
      6.    Hardware: This is the electromechanical part of computer system.  
      7.    Information: This is data that have been processed, interpreted and understood by the recipient of the message or report. 
      8.    Internet is a collection of computer networks that operate to common standards and enable the computes and the program they run to communicate directly.  9.    Server: This is a process that provides requested services for clients.  
      10.    Software: This is a logically written program that hardware uses to perform it’s operation. 
      11.    System is the collection of hardware, software, data information, procedures and people. 
      12.    Website is a space or location customized by a company, organization or an individual which is locatable within an address on the internet. 
  • CHAPTER ONE -- [Total Page(s) 2]

    Page 2 of 2

    Previous   1 2
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTNetwork Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining programming language; because this is achieved by the help of visual basic programming language and other programming language. For the first few decades of their existence, computer\ networks were primarily used by u ... Continue reading---