DESIGN AND IMPLEMENTATION OF E-SECURITY SYSTEM FOR COORPERATE INFORMATION ORGANIZATIONS

in COMPUTER ENGINEERING PROJECT TOPICS AND MATERIALS, COMPUTER SCIENCE EDUCATION PROJECT TOPICS, COMPUTER SCIENCES PROJECT TOPICS AND MATERIALS on February 10, 2021

CHAPTER ONE

INTRODUCTION      

1.1 Background of the study                                      

“Is it a fact that by means of electricity, the world of matter has become a great nerve, vibrating thousands of miles in breathless point of time? Rather the globe is a vast head, a brain, instinct with intelligence! Or shall we say it is itself a thought nothing but a thought”

Even before the event of September 11, electronic security was a growing area of concern for bank and other financial services providers in managing daily operational risk. Now, because of the rapid growth in wireless technology and its increasing use in providing financial services in emerging market, either in co-ordination with the internet or on a freestanding basis, there is even more demand for a careful look at issues related to electronic security.

Electronic security is the use of electronics means to exchange information or to transfer sighs and representation of values and to execute transactions in a commercial environment. E-security can be described on one hand as those policies, guidelines, processes and action needed to enable electronic transactions to be carried out with a minimum risk of breach, intrusion, or theft. E-security is any tool, techniques, or process used to protect a system’s information asset. The degree of e-security used for any activity should be proportional to the activity underlying value, thus, security is risk management tool or risk mitigation tool, and an appropriate security means mitigation of the risk for the underlying transaction in proportion to its value.

The need for security is a constant of doing business over the internet because, in essence, the internet is a broadcast medium. E-security enhances or adds value to a naked network and is composed of both a “soft” and a “hard” infrastructure. Soft infrastructure component are those policies, processes, protocols, and guidelines to create the protective environment to keep the system and data from compromise while the hard infrastructure are the actual hardware and software needed to protect the system and its data from internal and external threats to security.

1.2 Statement of the problem

Today in Nigeria, the wave of insecurity is highly increasing in geometric ratio, for that reason, kidnapping, fraud, robbery, intrusion, information theft, terrorism are common in Nigeria. Our business organization or corporate bodies as well and as public private organization and other governmental agencies suffer from one information insecurity or another on daily basis, we read regularly from newspapers and other forms of media, news of arson, information theft, hacking, intrusion, fraud in both public and private organization in Nigeria, especially our corporate organization. Current revolution in information technology have further aggravated the insecurity in our corporate information system, for example, attacks by foreign government and terrorism as well as attacks by criminals and hackers originating domestically, banks and vendors with weak security control are susceptible to business disruptions, theft of data, sabotage, corruption of key records and fraud. This therefore raises inquires on e-security system that’s omits the challenges of corporate information system insecurities in Nigeria. Invariably this study would respond to the following inquires. What are

  1. The available insecurities in our corporate organization.

ii        E-security system strategy applied today

iii       How can these e-Security techniques be applied to ameliorate or completely exterminate e-Security  challenges on corporate information system

1.3 Objectives of the Study

The objectives of the study are to develop a system that should be able to

i         Determine in details the various insecurities or security challenges    of our corporate information system in this e-era.

ii         Examine the various e-security techniques or strategies for information system

iii       Show how this e-security challenges or techniques would be used to ameliorate or completely exterminate our corporate information security challenges.

1.4 Significance of the study

The importance of e-security system cannot be over-emphasize because of the need of security in our corporate information system especially our corporate organizations.

i         Private and public companies who has one thing or another to do with information technology: E-security is important to business and governments today. In enterprise systems, a security exposure is a form of possible damage in the organizations information and communication systems. Example of exposure includes unauthorized disclosure of information, modification of business or employer’s data and denial of legal access to the information system. E-security addresses the security of a company, in order to keep adversaries (hackers, malicious users and intruders) from getting into the company’s networks, computer and services.

ii        Corporate organization in Nigeria: In order to protect the critical information (present in electronic form) belonging to any private or public sector organization, we need to employ the e-security measures services. Thus, in order to protect the critical information (present in electronic form) belonging to any private or public sector organization, we need to employ the e-security measures.

iii       Nigeria government and its agencies but especially Nigeria communication commission (NCC), internet and cyber organization, security organization, etc.

1.5 Scope of the study

The scope of the study defines the extent the researchers wish to go, in this study we would be writing on e-security.

We would especially examine insecurity strategies or challenges as it affects our corporate organization information system, determine available e-security strategies and as well as find how these e-security strategies would be used to cushion the challenges of e-security in our corporate information organization

1.6     Definition of Terms

E  as a prefix is denoting the of electronic data transfer in cyberspace, especially through the internet.

Security is the safety of the state or organization against criminal activity such as terrorism, theft or espionage, it is the procedure followed or measure taken to ensure the safety of a particular area.

E-security is another term for cyber security, it is the protection study of electromagnetic radiation.

Get Full Project

Add New Institution