• Design And Implementation Of Network Activity Monitoring System

  • CHAPTER ONE -- [Total Page(s) 3]

    Page 3 of 3

    Previous   1 2 3
    • 1.4            SIGNIFICANCE OF STUDY
      This work was embarked upon for several reasons discussed below and again provides answers to some questions like:
       What is the value in adopting an investigation system?
       Why should you invest time and money on this?
       What are the benefits to organisations?
      Therefore some of the significance and benefits of this work include:
       Increased employers loyalty: -What ultimately creates the employers loyalty is meeting and exceeding their expectation.
       Maintaining system integrity.
       Staying current on work status so as to know how well the organisation is going.
       Ensure proper handling of investigation in computing:This is the reason why we need a careful, methodical process for gathering digital data in the first place; and this is why we need network activity monitoring system.
       Increased employer’s retention:-The employees are an investment. Generally, it takes nine to twelve months or longer before an employee is a productive asset to a company. If an employee leaves after a year or two, the company has lost most of its investment.
       Information empowered decision making: -Most managers, executives and employers make decisions based upon all relevant information. There are some actions that can have a profound effect on corporate decision making; those actions are more easily justifiable when you have easily accessed the users system.
      1.5            SCOPES OF THE STUDY
      Although a network activity monitoring system involves many things and activities that can be run within it, yet due to lack of time and space, we were not able to use this software in other operating systems apart from windows operating system (that is from windows XP to windows operating system of higher versions). Furthermore this work did also not involve internet connectivity as well as detection of virus in a network.
      1.6            LIMITATIONS OF THE STUDY
      During the course of this study, many things militated against its completion, some of which are;
       Lack of finance
       Refusal of the Federal Inland Revenue Services Awka, to give detailed answers and in some cases no answer at all to some questions.
       This project is limited to all the data associated with the information gotten from the Federal Inland Revenue Service commission, and due to time factor, not all the commissions were reached for sources of data and information.
      1.7            DEFINITION OF TERMS
       NAMS (Network activity monitoring system): This is the system that is used monitor the daily activity of every user on a network
       Corporate fraud: This is the fraud committed by insiders in a large, publicly traded (or private) corporation, and/or by senior executives.
       Real time: Occurring immediately, this is used for such task as navigation, in which the computer must react to a steady flow of new information without interruption.
       LAN (local area network): This is computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings.
       Suid: A file attributes which allows a program to run as a specific user no matter who executes it.
  • CHAPTER ONE -- [Total Page(s) 3]

    Page 3 of 3

    Previous   1 2 3