DESIGN AND IMPLEMENTATION OF E-SECURITY SYSTEM FOR COORPERATE INFORMATION ORGANIZATIONS
in Research Project Paper , Studies & ThesisChoose Your Desired Option(s)
Share Now!
Background of the study
“Is it a fact that by means of electricity, the world of matter has become a great nerve, vibrating thousands of miles in breathless point of time? Rather the globe is a vast head, a brain, instinct with intelligence! Or shall we say it is itself a thought nothing but a thought”
Even before the event of September 11, electronic security was a growing area of concern for bank and other financial services providers in managing daily operational risk. Now, because of the rapid growth in wireless technology and its increasing use in providing financial services in emerging market, either in coordination with the internet or on a freestanding basis, there is even more demand for a careful look at issues related to electronic security.
Electronic security is the use of electronics means to exchange information or to transfer sighs and representation of values and to execute transactions in a commercial environment. E-security can be described on one hand as those policies, guidelines, processes and action needed to enable electronic transactions to be carried out with a minimum risk of breach, intrusion, or theft. E-security is any tool, techniques, or process used to protect a system’s information asset. The degree of e-security used for any activity should be proportional to the activity underlying value, thus, security is risk management tool or risk mitigation tool, and an appropriate security means mitigation of the risk for the underlying transaction in proportion to its value.
The need for security is a constant of doing business over the internet because, in essence, the internet is a broadcast medium. E-security enhances or adds value to a naked network and is composed of both a “soft” and a “hard” infrastructure. Soft infrastructure component are those policies, processes, protocols, and guidelines to create the protective environment to keep the system and data from compromise while the hard infrastructure are the actual hardware and software needed to protect the system and its data from internal and external threats to security.
1.2 Statement of the problem
Today in Nigeria, the wave of insecurity is highly increasing in geometric ratio, for that reason, kidnapping, fraud, robbery, intrusion, information theft, terrorism are common in Nigeria. Our business organization or corporate bodies as well and as public private organization and other governmental agencies suffer from one information insecurity or another on daily basis, we read regularly from newspapers and other forms of media, news of arson, information theft, hacking, intrusion, fraud in both public and private organization in Nigeria, especially our corporate organization. Current revolution in information technology have further aggravated the insecurity in our corporate information system, for example, attacks by foreign government and terrorism as well as attacks by criminals and hackers originating domestically, banks and vendors with weak security control are susceptible to business disruptions, theft of data, sabotage, corruption of key records and fraud. This therefore raises inquires on e-security system that’s omits the challenges of corporate information system insecurities in Nigeria. Invariably this study would respond to the following inquires. What are
i. The available insecurities in our corporate organization.
ii E-security system strategy applied today
iii How can these e-Security techniques be applied to ameliorate or completely exterminate e-Security challenges on corporate information system
Share Now!
You must log in and be a buyer of this download to submit a review.
Leave a reply Cancel reply