Abstract
In today’s society, serious
organizations need protection against both internal and external attacks. There
are many different technologies available that organizations can incorporate
into their organization in order to enhance security for their networking
applications. Unfortunately, security is way too often considered as an
afterthought and therefore implemented as an external part of the applications.
This is usually performed by introducing general security models and
technologies.
However, an already developed, well-structured
and considered security approach – with proper implementation of security
services and mechanisms – different security models can be used to apply
security within the security perimeter of an organization. It can range from
built into the application to the edge of a private network, e.g. an appliance.
No matter the choice, the involved people must possess security expertise to
deploy the proposed security models in this paper that have the sole purpose to
secure applications.
The system is very seamless and robust as its area of
functionality is elongated to secure the system from unauthorized access.
Sequel to development of several security measures, password method is seen to
be absolutely perfect system to ensure security with much of ado. This method
is a standalone system and it enhances settings that can be used to automate
the lock depending on time schedule and restriction privilege.
The essence of this application is to provide adequate security
measure to counter any attack from unauthorized users by enabling an automated
system that locks the system if remains idle for certain period of time as
scheduled by the user.
CHAPTER
ONE
INTRODUCTION
Attacks on computer by outside
intruder are more publicized but the ones perpetrated by insiders are very
common and often more damaging. Insiders represent the greatest threat to
computer security because they understand their organization’s business and how
their computer systems work. They have both the confidentiality and access to
perform these attacks. An inside attack will have a higher probability of
successfully breaking into the system and extracting critical information. The
insiders also represent the greatest challenge to securing the company network
because they have authorized level of access to the file system.
In a quest for maximum
profitability in a network, there is need to monitor the activities performed
such that the network activity in a real time would be tracked, confidential information
safeguarded and control over the daily activities of every staff established.
The question is: which and how would one develop the so much needed system that
would exhibit all these potentialities?
Security network connected applications
system is used to detect inside threats by monitoring file access and process
activity (Behr et al, 2009). It is a powerful tool that allows one to track any
local area network, giving you the most detailed information on when, how and
what your network users do on daily basis. If it is a library public network,
university or commercial organization network, Activity Monitor offers
efficient control. This work targets the monitoring of every activity of a user
in a computer network and maximizes the security for the organization or
corporate body.
1
1.1 BACKGROUND
OF STUDY
The Federal Inland Revenue
service (FIRS) is one of the federal ministries charged with the responsibility
of accessing, collecting, and accounting for the various taxes to the federal
government since 1943.
Tax revenue has been reliable
from time, from where government rely for decision making, and aids for
development and administrative planning, hence the need for optimum human
resource of the organisation or ministry; for it’s considered to be their most
valuable asset if properly harnessed and are well motivated to perform their
assigned tasks so as to enhance the organisations goals and objectives.
Computer security network
connected applications system has become one of the vital tools in providing
evidence in cases such as computer misuse and fraud. Computers and other
devices are being used increasingly to commit, enable or support unwanted
activity perpetrated against individuals, organizations or assets. Although it
is most often associated with the investigation of a wide variety of computer
crime, security network connected applications system may also be used in civil
proceedings. The discipline involves similar techniques and principles to data
recoveryand a lot of information is retained on the computer than most people
realize. It’s also more difficult to completely remove information than it is
generally thought. For these reasons (and many more), security network
connected applications system can often find evidence or even completely
recover lost or deleted information, even if the information was intentionally
deleted.
This
system consist of two tier application – server and client whereby the activity
monitoring server can be installed in any computer in the entire local area
network and the client which is the remote spy software is installed on all the
computers on the network to be monitored.
2
1.2 STATEMENT OF
PROBLEM
The existing system used by
FIRS has been a challenge to them. Amongst the problems affecting the FIRS from
maintaining a steady reliable accounting figures and estimates are:-
With the current system, staffs easily erase
or add data in order to cover up their fraud since there is no back up of the
activity log. Frauds like computer fraud: - loss or damage to money, securities
resulting directly from the use of any computer to fraudulently cause a
transfer of money or other property from inside the premises to a personat a
place outside the premise.
Their method of operation is not so efficient
for both units in the department (Operations and Reconciliation units).Both
units cannot work at the same time, and this is because the staffs in one of
the unit (reconciliation unit) has to wait for the staffs in the other unit
(operation unit) to get their work to some extent before they can process their
own work, and while they are processing their own work, the staffs in the
operation unit has to pause their work a little,and with this manual of
operation in the department, rooms for corporate fraud is being created.
These are the more reasons, why the
researcher embarked on this research.
1.3 OBJECTIVES
OF STUDY
This project targets towards
discovering what should be done to improve the existing system, monitoring the
daily activities of every user in a network and using it to provide evidence to
frauds or crimes committed using computer technology which some people referred
to as digital crime; that is crime committed using a computer system.
The
objective of this work is to develop a system that should be able to;
3
1. Monitor the
daily activities of every user in a network in real time.
2.
Detect active users.
3.
Provide accurate evidence on
corporate fraud when investigation is being carried out in an organization.
4.
Has a good memory management for efficient carrying out of
activities.
1.4 SIGNIFICANCE
OF STUDY
This
work was embarked upon for several reasons discussed below and again provides
answers to some questions like:
What is the value in adopting an investigation
system?
Why should you invest time and money on this?
What are the benefits to organisations?
Therefore
some of the significance and benefits of this work include:
Increased employers loyalty: -What ultimately
creates the employers loyalty is meeting and exceeding their expectation.
Maintaining system integrity.
Staying current on work status so as to know
how well the organisation is going.
Ensure proper handling of investigation in
computing:This is the reason why we need a careful, methodical process for
gathering digital data in the first place; and this is why we need security
network connected applications system.
Increased employer’s retention:-The
employees are an investment. Generally, it takes nine to twelve months or
longer before an employee is a productive asset to a company. If an employee
leaves after a year or two, the company has lost most of its investment.