CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
Data processing, being the main activity that a computer performs, refers to the manipulation of codes, handling and processing of data to provide reasonable information for human needs, computer is the machine designed to process these and to assist man as in the case vehicle s which assist the legs, binoculars and telescope to assist the eyes and microphones which assist the mouth (voice), computers are designed to assists man’s brain. These machines are equally essential to man’s day to day activities though their importance cannot be compared to that of computer. Computers aid man in key fields of endeavors and professionalism, from educational institution to medical expertise and diagnosis, security, law and order and even the government. Banking and finance and other economic operation cannot be explored to the fullest where computers are kept at bay. These fields all rely on information to operate and function smoothly and for information to be gotten on a steady, secured and reliable frequency, stored and processed without much stress or mistake, computer is introduced as it is a machine known for its efficiency and capability amongst its numerous qualities (Needles, & Marian, 2018).
This project is focused majorly on the use of highly secured software for banks. The use of Anti-Malware software for customer’s savings account details and transactions (deposit and withdrawal) which helps to enhance the data security in the Bank. Customer care is a crucial element of business success (Needles, & Marian, 2018). Every time you have contact with your customers you have an opportunity to improve your reputation with them and increase the likelihood of further sales. From your telephone manner to the efficiency of your order-fulfillment systems, almost every aspect of your business affects the way your customers view your business.
What motivated the researcher to write this project is because of some reasons that was observed in the existing system. Some of the challenges are; firstly, absence of an intrusion detection and prevention system, which makes it possible for intruders to gain access to sensitive information stored in the organization, lack of Data integrity: due to the manual mode of keeping record, Intruders enjoys ease access to the record, altering the sensitive information, and finally, data insecurity: Insecurity of customer information causes data loss. Because of the problems observed in the existing system, design and implementation of an Intrusion detection and prevention system for banking system is initiated to ease all problems.
- Statement of the Problems
A vast number of people are vulnerable to security breaches but do not know how they can avoid it. Currently, there are various IDPS known, used, and actively being built. For any big company, common user, or vendor, a problem arises when they want to decide upon which IDPS should be implemented on their network or host as per their requirements and the features of the IDPS. Therefore, awareness and a contrast on an IDPS and its features must be well known to understand and compare different security systems available.
The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system;
- Absence of an intrusion detection and prevention system, which makes it possible for intruders to gain access to sensitive information stored in the organization.
- Low level of file security.
- It is very cumbersome to manually reconcile all customer information from different files sources into their work sheet.
- Data insecurity: Insecurity of customer information causes data loss.
- Lack of Data integrity: Due to the manual mode of keeping record, Intruders enjoys ease access to the record, altering the sensitive information.
- Aim and Objectives of the Study
The aim and objective of this research work is to design and implement an Intrusion Detection Prevention system for banking system that will work towards the elimination of ineffective mode of operation in the existing (manual banking) system.
The objectives of this study are;
- To design a system that will encrypt information pertaining to customers to prevent intrusion.
- To create awareness of IDS/IPS.
- To develop a system that will require an encryption key before bank transaction information can be viewed.
- To implement a system that will prevent disclosure of customers’ data to fraudsters by utilizing cipher text.
- To ensure easy flow of information between the management and their customers.
1.4 Significance of the Study
The significance of the study is linked to the key attributes of a computer system i.e. data security, data integrity, speed accuracy and reliability. Banks are always expected to compute and manipulate a customer’s account details in a short time frame and with little or no mistake since there are other customers waiting to be attended to. Thus the significance of this study is to increase the security level, speed and accuracy at which customers are tended reliably, preventing unauthorized individuals (intruders) from gaining access to the financial information of customers, tightening the security level of the organization, and the study will reveal how encryption can be applied to prevent intruders from gaining access to customer information, and also the study will serve as a useful reference material to other researchers seeking related information. Afterwards, further development can be made on the project work in accordance to the rapid development in information technology in the near future.
1.5 Scope of the Study
The scope of this project is limited to the development of an Intrusion Detection, Prevention Mechanism, Aguleri Micro Finance Bank, Aguleri, considering the data security and data integrity for customers’ record. It is limited to the use of cipher/ code text encryption to prevent intruders from gaining access to vital information of customers because it contains a form of the original plaintext that is unreadable by a human or computer without a proper cipher to decrypt it. It is expected that this project will be successful enough to draw interest from other business companies.
1.6 Limitations of Study
Some of the constraints that may have in one-way or another affected the outcome of this work include:
- Lack of adequate fund to finance the project: this was one of the limitation to this work because much money is needed to carry out a detailed research work which is not easily borne by every student.
- The limited knowledge of ASP.net and Visual Basic programming was great challenge to this project. However, more research was made to complete this project successfully.
1.7 Definition of Terms
Analyst: This is a person or professional who studies the problem encountered by a system and creates means of solving them by introducing a better system.
Banking: This is referred to as the act of keeping valuables (money, documents, properties, ornaments) in a bank for safe keeping.
Business: this is the activity of making one’s living or making money by producing or buying and selling products (such as goods and services). Simply put, it is “any activity or enterprise entered into for profit (Needles, & Marian, 2018).
Computer: It is an electronic device operating the control of instructions stored in its memory that can accept data (input) manipulate the data according to a specified rules (processing) produces result output and stores the result for future use.
Customer: A customer is a person or organization who patronizes a bank for safe keeping of valuables.
Data processing: is defined as the entire process of converting or manipulating data into definite meaningful information (Adigwe, & Okoye, 2019).
Data: It is the facts collected for decision making they are facts that are kept to be processed to get more information.
Database Management System (DBMS): it is software which controls the flow of data and checks and checks on how data are stored.
Database: is an organized /unique collection of related files. It is a collection of schemas, tables, queries, reports, views and other object.
Deposit: Money placed in an account.
Detection: this is the extraction of particular information from a larger stream of information without specific cooperation from or synchronization with the sender.
Electronic Data Processing Equipment (EDP): it is a machine that performs the work of data manipulation.
Finance: the management of money and other assets.
Intrusion Detection System (IDS): is a software or hardware component that automates the intrusion detection process. It is designed to monitor the events occurring in a computer system and network and responds to events with signs of possible incidents of violations of security policies.
Intrusion Prevention System (IPS): on the other hand, is the technology of both detecting of intrusion or threat activities and taking preventive actions to seize them. It combines the knowledge of IDS in an automated manner.
Intrusion: It is an illegal act of entering possession of another’s property.
Management Information System (MIS): Information system that generates accurate timely and organized information so that manager and other user can make decision, solve problem supervise activities and track progress.
Password: A special code used by user to gain access to the database or a research.
Prevention: Maintenance performed to stop fault occurring or developing into major detects.
Security: This helps to prevent unauthorized users from illegally accessing certain data in the database, it protects your data/ files.
Software: These are set of logically related instructions given to the computer to perform some specific task.
System: Is the collection of hardware and software, data information procedure and people.
Transaction: it is a business event that has a monetary impact on an entity’s financial statements, and is recorded as an entry in its accounting records.
Withdrawal: Receiving from a deposit made.
DISCLAIMER: All project works, files and documents posted on this website, UniProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. UniProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. All creative work builds on what came before. Nothing is completely original.” - Austin Kleon. The paid subscription on UniProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.