• Design And Implementation Of Network Activity Monitoring System

  • CHAPTER ONE -- [Total Page(s) 3]

    Page 2 of 3

    Previous   1 2 3    Next
    • 1.2            STATEMENT OF PROBLEM
      The existing system used by FIRS has been a challenge to them. Amongst the problems affecting the FIRS from maintaining a steady reliable accounting figures and estimates are:-
       With the current system, staffs easily erase or add data in order to cover up their fraud since there is no back up of the activity log. Frauds like computer fraud: - loss or damage to money, securities resulting directly from the use of any computer to fraudulently cause a transfer of money or other property from inside the premises to a personat a place outside the premise.
       Their method of operation is not so efficient for both units in the department (Operations and Reconciliation units).Both units cannot work at the same time, and this is because the staffs in one of the unit (reconciliation unit) has to wait for the staffs in the other unit (operation unit) to get their work to some extent before they can process their own work, and while they are processing their own work, the staffs in the operation unit has to pause their work a little,and with this manual of operation in the department, rooms for corporate fraud is being created.
      These are the more reasons, why the researcher embarked on this research.
      1.3            OBJECTIVES OF STUDY
      This project targets towards discovering what should be done to improve the existing system, monitoring the daily activities of every user in a network and using it to provide evidence to frauds or crimes committed using computer technology which some people referred to as digital crime; that is crime committed using a computer system.
      The objective of this work is to develop a system that should be able to;
      1.     Monitor the daily activities of every user in a network in real time.
      2.     Detect active users.
      3.     Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.
      4.     Has a good memory management for efficient carrying out of activities.

  • CHAPTER ONE -- [Total Page(s) 3]

    Page 2 of 3

    Previous   1 2 3    Next