DESIGN AND IMPLEMENTATION OF NETWORK ACTIVITY MONITORING SYSYTEM. (A CASE STUDY OF ANAMBRA STATE FEDRAL INLAND REVENUE SERVICES, F.I.R.S)

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1816
  • Access Fee: ₦5,000 ($14)
  • Pages: 55 Pages
  • Format: Microsoft Word
  • Views: 372
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

CHAPTER ONE

INTRODUCTION

Attacks on computer by outside intruder are more publicized but the ones perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their computer systems work. They have both the confidentiality and access to perform these attacks. An inside attack will have a higher probability of successfully breaking into the system and extracting critical information. The insiders also represent the greatest challenge to securing the company network because they have authorized level of access to the file system.

In a quest for maximum profitability in a network, there is need to monitor the activities performed such that the network activity in a real time would be tracked, confidential information safeguarded and control over the daily activities of every staff established. The question is: which and how would one develop the so much needed system that would exhibit all these potentialities?

Network activity monitoring system is used to detect inside threats by monitoring file access and process activity (Behr et al, 2009). It is a powerful tool that allows one to track any local area network, giving you the most detailed information on when, how and what your network users do on daily basis. If it is a library public network, university or commercial organization network, Activity Monitor offers efficient control. This work targets the monitoring of every activity of a user in a computer network and maximizes the security for the organization or corporate body.

1.1 BACKGROUND OF STUDY

The Federal Inland Revenue service (FIRS) is one of the federal ministries charged with the responsibility of accessing, collecting, and accounting for the various taxes to the federal government since 1943.

Tax revenue has been reliable from time, from where government rely for decision making, and aids for development and administrative planning, hence the need for optimum human resource of the organisation or ministry; for it’s considered to be their most valuable asset if properly harnessed and are well motivated to perform their assigned tasks so as to enhance the organisations goals and objectives.

Computer network activity monitoring system has become one of the vital tools in providing evidence in cases such as computer misuse and fraud. Computers and other devices are being used increasingly to commit, enable or support unwanted activity perpetrated against individuals, organizations or assets. Although it is most often associated with the investigation of a wide variety of computer crime, network activity monitoring system may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery and a lot of information is retained on the computer than most people realize. It’s also more difficult to completely remove information than it is generally thought. For these reasons (and many more), network activity monitoring system can often find evidence or even completely recover lost or deleted information, even if the information was intentionally deleted.

This system consist of two tier application – server and client whereby the activity monitoring server can be installed in any computer in the entire local area network and the client which is the remote spy software is installed on all the computers on the network to be monitored.


DESIGN AND IMPLEMENTATION OF NETWORK ACTIVITY MONITORING SYSYTEM. (A CASE STUDY OF ANAMBRA STATE FEDRAL INLAND REVENUE SERVICES, F.I.R.S)
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1816
  • Access Fee: ₦5,000 ($14)
  • Pages: 55 Pages
  • Format: Microsoft Word
  • Views: 372
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1816
    Fee ₦5,000 ($14)
    No of Pages 55 Pages
    Format Microsoft Word

    Related Works

    CHAPTER ONE INTRODUCTION Attacks on computer by outside intruder are more publicized but the ones perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their computer systems work. They have both the... Continue Reading
    DESIGN AND IMPLEMENTATION OF NETWORK ACTIVITY MONITORING SYSYTEM. (A CASE STUDY OF ANAMBRA STATE FEDRAL INLAND REVENUE SERVICES, F.I.R.S) CHAPTER ONE INTRODUCTION Attacks on computer by outside intruder are more publicized but the ones perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to... Continue Reading
    THE IMPACT OF TAX POLICY REFORMS ON REVENUE GENERATION IN NIGERIA ABSTRACT This research study on the impact of tax reforms on revenue generation in Nigeria was carried out to ascertain the impact of tax reforms on the volume of revenue generated from various taxes collectable at the Federal Inland Revenue Service Calabar. Furthermore, the study... Continue Reading
    ABSTRACT The main purpose of this research work was to examine the Federal Character Principle and Quota System in Nigeria and its relationship with the recruitment exercise in the public service. This was prompted by the fact that there is growing disenchantment in some quarters about the implementation of the federal character principle and... Continue Reading
    ABSTRACT This research aimed at designing and developing the monitoring tool of employee activities in Uganda Revenue Authority. The main objective of the research was to design and test a web based activity monitoring tool for employees of Uganda Revenue Authority. The study specific objectives were; to identify the requirements for designing and... Continue Reading
    ABSTRACT This research aimed at designing and developing the monitoring tool of employee activities in Uganda Revenue Authority. The main objective of the research was to design and test a web based activity monitoring tool for employees of Uganda Revenue Authority. The study specific objectives were; to identify the requirements for designing and... Continue Reading
    ABSTRACT The main purpose of this research project is to examine the impact of employee development on employee performance in Federal Inland Revenue Service, Abuja. Structured questionnaires using the 5-point Likert scale were distributed to 255 employees of Federal Inland Revenue Service, Abuja. With a response rate of 74% (191 responses), the... Continue Reading
    CHAPTER ONE INTRODUCTION        Network monitoring takes note of slow or failing systems and notifies the network administrator of such occurrences. Such notifications can take the form of email massage, page alerts, or plain old phone calls. No matter what form they take, network problem massage should take the highest priority. Network... Continue Reading
    CHAPTER ONE Background to the Study Taxation as a concept involves more than mere imposition of compulsory payment of sums of money by the government and its agents. It is the sum total of compulsory sum of money by the... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    Call Us
    whatsappWhatsApp Us