COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM

By

Author

Presented To

Department of Computer Science

COMPUTER BASE NETWORK SECURITY AND FIREWALLS IN BANKING SYSTEM

(A Case Study Of Diamond Bank Nig Plc Owerri)

ABSTRACT
The degree of accidence of an organisation that services to customer such as banks security depends on speed and accuracy with the service performed in the banks which include information processing e.g. data entry. Data using sorting data, updating data and service data etc. which are better suited to computer. 
Therefore the acquisition of this latest gadgets in business goes long as toward keeping you a step ahead your competitor therefore most of the new banks being established go straight into bank securing and computerisation of fire wall.
In conclusion, the reality of this project work is described as distributed computing in bank security processing that is the computerization of bank security and fire wall in banking operation particularly in area of banking security.
TABLE OF CONTENT
Title page 
Certification 
Dedication 
Acknowledgement 
Abstract 
Table of content

CHAPTER ONE
10 INTRODUCTION 

11 Back ground of study 
12 Statement of the problem 
13 Objectives of the study 
14 Significance of the study 
15 Scope of the study 
16 Limitation of the study 
17 Definition of terms

CHAPTER TWO
20 LITERATURE REVIEW 

21 Introduction 
22 Literature 
23 Network 
24 Types of network 
25 Network and banking 
26 Advantages and disadvantages of net work 
27 Security concepts 
28 Network security 
29 Mode of data transmission 
210 Fire walls its types components and techniques

CHAPTER THREE 
30 SYSTEM INVESTIGATION ANALYSIS AND DESIGN OF 1/0 FORMS

31 Introduction 
32 System investigation 
33 System analysis 
34 Designing of input / output forms 
35 Research methodology 
36 Sources of data 
37 System proposal 
38 Objective of the system

CHAPTER FOUR 
40 SYSTEM DESIGN 

41 Introduction 
42 Programming testing implementation and handour change over 
43 Programming and testing 
44 Implementation 
45 Handover changing over

CHAPTER FIVE 
50 SUMMARY RECOMMENDATION AND CONCLUSION 

51 Introduction 
52 Summary 
53 Recommendation 
54 Conclusion 
References

CHAPTER ONE

10 INTRODUCTION 
The interconnection of computer with other related office equipments are finding increasing application in almost all field of human endeavour most especially the financial
sector More and more banks are introducing the use of computer networks in their establishment These provide for easy access to the information and services available in the organisation 
Because of the high value of information, organisations now classify their data as well as putting a lot of effort to safeguard it Networking is the vehicle for sharing information where as network security is a way to protect the information, information sharing cannot be constrained by physical or geographical location and today’s information has been made accessible to all by means of global network For an organisation to become parts of this global network, it first need to have his own Local area network (LAN), which is then connected to the internet by means of a Wide area network (WAN) Computer security focuses on two main problems 
a How to protect the physical equipment of the computer 
b How to protect against unauthorized use of the
Computer faculties by intruders The objective of network security is to control access to corporate and government data residing on network services or transmitted over the LAN or WAN

11 BACKGROUND OF STUDY 
Diamond Bank Nigeria limited was established with the aim of providing banking services to the general public It is first growing commercial bank incorporate with headquarter and about 8 or more branches scattered across the country, which included Imo, Abia, Calabar and Ibadan etc with a staff strength of more than 500 workers, they provide banking service to the public which include 
a The handling of cash and provision of bank drafts 
b The provision of facilities for the safe keeping of
Important document and title delds 
c The lending of money in the form of loans and
Overdrafts 
d The management of customers’ investment such as the
Purchase of stocks and shares and the receipts of periodic dividends 
e The transfer of funds to other places periodically

12 STATEMENT OF THE PROBLEM 
Diamond bank Nigeria limited has a large volume of information, which it has to handle efficiently in other to evolve efficiently corporate management and improved customer services The information needed to carry out operation geared toward customer satisfaction must be highly secured and transmitted properly too Since the banks uses computer network in their activities, there are bound to be threats to security which hinders work progress in the organisation, once the organisation launches it presence in the internet 
Most banks lack awareness on how a network can be implemented, secured and maintained Threats to network security are sometimes difficult to track and it won’t be easy to refuse the request of the attackers Without refusing legitimate request for services This attack comes from any connection that the bank has with the outside world, which included dial up moderns, and internet connection So in order to adequately address security all possible avenues of entry must be identified and evaluated, also the security of every point must be consistent with stated policy on acceptable risk levels

13 OBJECTIVE OF THE STUDY 
Networking is the backbone of accessing vital information the world has becomes a global village, sharing everything through networking Networks requires a high level of security, which involves the technical and administrative safeguards required to protect a computer based system (hardware, personnel data) against the major hazards to which most computer system are exposed and to control accessed to information The work is aimed at defining/providing a security system that will keep unauthorized uses from the protected areas of the network This system will also prohibit potentially vulnerability services from entering or leaving the network The system will also provide a location for monitoring security related events and adults as well as the overall security management of the network

14 SIGNIFICANCE OF THE STUDY 
a Network security and fire walls are useful in banking sectors and in their services 
b It is useful to the banks in other sectors who would wish to use network security and firewall in their banks 
c It shows need for security in banking sectors

15 SCOPE OF THE STUDY 
This study presents an overview of security system network and firewalls its highlights are on firewalls Risks threats and vulnerability of network It also concentrates on design of security system and network types

16 LIMITATION OF THE STUDY 
This research was limited by the shortness of time giving rise to the limited study of network security and firewalls Also the finance to embarked upon a higher level of research was not available The bank on its part did not give out much information that would have really aided the writing of this work due to some security reasons 
Additionally, this research was carried out at the Owerri branch office of diamond bank Therefore the research was based on the branch section and not from the centre

17 DEFINITION OF TERMS 
Network: Network in computing a number of computer and other devices that are connected together so that equipment and information can be snared 
Security: These are activities that involves protecting a building or person against attack danger hazards 
Fire wall: Fire wall in computing is a part of a computer system that is designed to prevent people from getting at information without authority But still allows them to received information that is sent to them 
Computer: Computer is an electronic device that accept data, processes the data and gives information under automatic control 
Bank: This is an organisation that provides various financial service eg keeping or lending money 
Personnel: Person who manage, design program, control or operate an information processing system and maintain access to the network 
Policy: This layer defines the umbrella of the security program It defines the policies of the organisation without a complete, effective and well implemented policy the security program cannot be complete 
LAN: LOCAL AREA NETWORK
MAN: METROPOLITAN AREA NETWORK 
WAN: WIDE AREA NETWORK 
E-MAIL: ELECTRONIC MAIL 
FAX: FACSITAILE DOCUMENT TRANSMISSION

Learn and Obtain Diploma in Web development, Software development, Business, Technology and Creative Skills taught by industry experts. Explore a wide range of skills with our professional tutorials.

About E-Project Material Centre


E-Project Material Centre is a web service aimed at successfully assisting final year students with quality, well researched, reliable and ready made project work. Our materials are recent, complete (chapter 1 to Minimum of Chapter 5, with references) and well written.INSTANT ACCESS! INSTANT DOWNLOAD. Simply select your department, choose from our list of topics available and explore your data

Why Students Love to Use E-Project Material ?


Guaranteed Delivery Getting your project delivered on time is essential. You cannot afford to turn in your project past the deadline. That is why you must get your project online from a company that guarantees to meet your deadline. e-Project Topics Material Centre is happy to offer instant delivery of projects listed on our website. We can handle just about any deadline you send our way. Satisfaction Guaranteed We always do whatever is necessary to ensure every customer's satisfaction

Disclaimer


E-Project Topics Material Centre will only provide projects as a reference for your research. The projects ordered and produced should be used as a guide or framework for your own project. The contents of the projects should be able to help you in generating new ideas and thoughts for your own project. It is the aim of e-Project Topics Centre to only provide guidance by which the projects should be pursued. We are neither encouraging any form of plagiarism nor are we advocating the use of the projects produced herein for cheating.

Terms and Condition


Using our service is LEGAL and IS NOT prohibited by any university/college policies You are allowed to use the original model papers you will receive in the following ways:
  • As a source for additional understanding of the subject
  • As a source for ideas for you own research (if properly referenced)
  • For PROPER paraphrasing ( see your university definition of plagiarism and acceptable paraphrase) Direct citing ( if referenced properly)
Thank you so much for your respect to the authors copyright