• Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service

  • CHAPTER FIVE -- [Total Page(s) 1]

    Page 1 of 1

    • CHAPTER FIVE SUMMARY AND CONCLUSION
      5.1    Summary
      The topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.
      5.2    Review of Achievements
      The activity monitoring system was tested and found to achieve the following:
      ➢    It monitored the daily activities of the clients.
      ➢    Has a great impact on memory management of the server.
      ➢    Detected active users.
      ➢    Provided accurate evidence on corporate fraud when investigation is being carried out in an organization with regards to date and time.
      ➢    Captured and saved screen shots of every user’s daily activities.
      5.3    Suggestions for Further Studies
      The developed system can be integrated to monitor micro-programs that can run within the system without actually displaying on the computer screen, or another activity monitoring system that can make use of other means of monitoring the activities on the network apart from screen-capturing can be developed so as to enable monitoring not only the activities that can be displayed on the computer screen but also the ones that can run within the system without actually displaying it on the computer screen.
      5.4    Areas of Application
      The activity monitoring system can be applied in so many areas where there is need to monitor the clients in a network. Financial institution, private and public sector and so on can benefit from using the software, but with further enhancement it can be used in global organization like the internet service providers, bank etc.
      5.5    Conclusion
      Today, computing system which consists of a broad range of processors, communication network and information repositories are vital to the operations of many sectors in our society, from financial and manufacturing to education and health care.
      Network activity monitoring system is a desktop based application, developed to assist organization and institution in monitoring the activities running in their network domain to decrease financial fraud, improve the staff productivity and improve confidentiality of data.
      With activity monitoring system as a powerful tool for monitoring activities and hidden data in activity logs, all data and files can be capture and kept securely over the server without tipping of attackers.
      The view of this work has shown that monitoring the activities on a network system is efficient because there may not be room for any lapses in delay time in identifying what might have probably gone wrong assuming a problem arises. However implementation of the proposed system will improve the company’s performance in relation to accessing the activity logs. With the necessity of information flow in a network, putting a monitoring mechanism (wired or wireless) in place will go a long way in checkmating hacker authentications into networks.

  • CHAPTER FIVE -- [Total Page(s) 1]

    Page 1 of 1

    • ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---

         

      APPENDIX A - [ Total Page(s): 4 ]Regadmin.php ... Continue reading---

         

      APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]The objective of this work is to develop a system that should be able to;➢    Detect active users.➢    Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.➢    Monitor the daily activities of every user in a network in real time.➢    Has a good memory management for efficient carrying out of activities.1.4    Significance of StudyTherefore some of the significance and benefits of this work include:➢    ... Continue reading---

         

      CHAPTER TWO - [ Total Page(s): 5 ]The Pathneck technique uses a carefully constructed packet train to locate bottleneck links, making it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those properties make it attractive for both regular network users and ISP network operators.The BRoute system uses a novel concept source and sinks trees to capture end-user routing structures and network-edge bandwidth information. Equipped with path- edge ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 3 ]CHAPTER THREESYSTEM ANALYSIS AND RESEARCH METHODOLOGY3.1    IntroductionSystem analysis is the study of a system, with the view to determine the bottlenecks and desired end product and establish the most efficient method of obtaining this end (American Heritage Dictionary, 2003). It is the analysis of the requirements of a task, and expression of these tasks in a form that enables a computer to perform the task. System analysis also refers to the process through which an existing system is ex ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 7 ] ... Continue reading---

         

      REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---