USE OF NETWORK ACTIVITY MONITORING SYSTEM TO SOLVE PROBLEMS
Need help with a related project topic or New topic? Send Us Your Topic
DOWNLOAD THE COMPLETE PROJECT MATERIAL
USE OF NETWORK ACTIVITY MONITORING SYSTEM TO SOLVE PROBLEMS
Chapter One: Introduction
Insider attacks on computers are typically more devastating than those performed by outside intruders, which receive more attention. Insiders pose the greatest threat to computer security as they understand the organization’s business and computer systems.
They have the secrecy and access to carry out these attacks. Insider attacks are more likely to successfully gain access to crucial information. Insiders pose a significant threat to network security due to their authorised access to file systems.
To maximise profitability in a network, it’s important to monitor real-time activity, preserve secret information, and create control over everyday staff actions. The question is: how to create a system with all these potentials?
The network activity monitoring system detects inside threats by monitoring file access and process activity (Behr et al, 2009). This sophisticated programme tracks any local area network and provides precise statistics on daily user activity.
Activity Monitor provides effective control over networks in libraries, universities, and commercial organisations. This work focuses on monitoring user activities in a computer network to enhance organisational security.
1.1 Background of the Study
Since 2010, the Benue State Internal Revenue Service (BIRS) has been in charge of tax collection and accounting for the state government.
The government relies on tax revenue for decision-making, development, and administrative planning. Therefore, effective human resource management is crucial for organisations and ministries to achieve their goals and objectives.
Computer network activity monitoring systems are essential for supplying evidence in cases of computer misuse and fraud. Unwanted conduct against individuals, organisations, or assets increasingly involves the use of computers and other technologies.
Network activity monitoring systems are commonly employed to investigate computer crimes, but they can also be utilised in civil cases. The subject uses comparable procedures and ideas to data recovery, and computers store more information than people realise.
Removing all information can be more challenging than commonly assumed. Network activity monitoring systems can retrieve lost or erased information, even if it was purposely deleted.
The system consists of two applications: a server for activity monitoring and a client for remote spying. The server can be installed on any computer in the local area network, while the client is installed on all monitored devices.
1.2 Statement of Problem
The present BIRS system has been a headache for them. The BIRS struggles to maintain consistent and credible accounting statistics and estimations due to issues such as staff erasing or adding data to conceal fraud, and the lack of activity log backups.
Frauds resemble computer fraud: – Fraudulent use of a computer to transfer money or property from inside to outside the premises, resulting in loss or damage to money and securities.
Need help with a related project topic or New topic? Send Us Your Topic