1.1 Background of the Study
Data processing, being the main activity that a computer performs, refers to the manipulation of codes, handling and processing of data to provide reasonable information for human needs, computer is the machine designed to process these and to assist man as in the case vehicle s which assist the legs, binoculars and telescope to assist the eyes and microphones which assist the mouth (voice), computers are designed to assists man’s brain. These machines are equally essential to man’s day to day activities though their importance cannot be compared to that of computer. Computers aid man in key fields of endeavors and professionalism, from educational institution to medical expertise and diagnosis, security, law and order and even the government. Banking and finance and other economic operation cannot be explored to the fullest where computers are kept at bay. These fields all rely on information to operate and function smoothly and for information to be gotten on a steady, secured and reliable frequency, stored and processed without much stress or mistake, computer is introduced as it is a machine known for its efficiency and capability amongst its numerous qualities (Needles, & Marian, 2018).
This project is focused majorly on the use of highly secured software for banks. The use of Anti-Malware software for customer’s savings account details and transactions (deposit and withdrawal) which helps to enhance the data security in the Bank. Customer care is a crucial element of business success (Needles, & Marian, 2018). Every time you have contact with your customers you have an opportunity to improve your reputation with them and increase the likelihood of further sales. From your telephone manner to the efficiency of your order-fulfillment systems, almost every aspect of your business affects the way your customers view your business.
What motivated the researcher to write this project is because of some reasons that was observed in the existing system. Some of the challenges are; firstly, absence of an intrusion detection and prevention system, which makes it possible for intruders to gain access to sensitive information stored in the organization, lack of Data integrity: due to the manual mode of keeping record, Intruders enjoys ease access to the record, altering the sensitive information, and finally, data insecurity: Insecurity of customer information causes data loss. Because of the problems observed in the existing system, design and implementation of an Intrusion detection and prevention system for banking system is initiated to ease all problems.
A vast number of people are vulnerable to security breaches but do not know how they can avoid it. Currently, there are various IDPS known, used, and actively being built. For any big company, common user, or vendor, a problem arises when they want to decide upon which IDPS should be implemented on their network or host as per their requirements and the features of the IDPS. Therefore, awareness and a contrast on an IDPS and its features must be well known to understand and compare different security systems available.
The following problems were identified in the existing system that necessitated the development of the intrusion detection and prevention system;
The aim and objective of this research work is to design and implement an Intrusion Detection Prevention system for banking system that will work towards the elimination of ineffective mode of operation in the existing (manual banking) system.
The objectives of this study are;
1.4 Significance of the Study
The significance of the study is linked to the key attributes of a computer system i.e. data security, data integrity, speed accuracy and reliability. Banks are always expected to compute and manipulate a customer’s account details in a short time frame and with little or no mistake since there are other customers waiting to be attended to. Thus the significance of this study is to increase the security level, speed and accuracy at which customers are tended reliably, preventing unauthorized individuals (intruders) from gaining access to the financial information of customers, tightening the security level of the organization, and the study will reveal how encryption can be applied to prevent intruders from gaining access to customer information, and also the study will serve as a useful reference material to other researchers seeking related information. Afterwards, further development can be made on the project work in accordance to the rapid development in information technology in the near future.
1.5 Scope of the Study
The scope of this project is limited to the development of an Intrusion Detection, Prevention Mechanism, Aguleri Micro Finance Bank, Aguleri, considering the data security and data integrity for customers’ record. It is limited to the use of cipher/ code text encryption to prevent intruders from gaining access to vital information of customers because it contains a form of the original plaintext that is unreadable by a human or computer without a proper cipher to decrypt it. It is expected that this project will be successful enough to draw interest from other business companies.
1.6 Limitations of Study
Some of the constraints that may have in one-way or another affected the outcome of this work include:
1.7 Definition of Terms
Analyst: This is a person or professional who studies the problem encountered by a system and creates means of solving them by introducing a better system.
Banking: This is referred to as the act of keeping valuables (money, documents, properties, ornaments) in a bank for safe keeping.
Business: this is the activity of making one’s living or making money by producing or buying and selling products (such as goods and services). Simply put, it is “any activity or enterprise entered into for profit (Needles, & Marian, 2018).
Computer: It is an electronic device operating the control of instructions stored in its memory that can accept data (input) manipulate the data according to a specified rules (processing) produces result output and stores the result for future use.
Customer: A customer is a person or organization who patronizes a bank for safe keeping of valuables.
Data processing: is defined as the entire process of converting or manipulating data into definite meaningful information (Adigwe, & Okoye, 2019).
Data: It is the facts collected for decision making they are facts that are kept to be processed to get more information.
Database Management System (DBMS): it is software which controls the flow of data and checks and checks on how data are stored.
Database: is an organized /unique collection of related files. It is a collection of schemas, tables, queries, reports, views and other object.
Deposit: Money placed in an account.
Detection: this is the extraction of particular information from a larger stream of information without specific cooperation from or synchronization with the sender.
Electronic Data Processing Equipment (EDP): it is a machine that performs the work of data manipulation.
Finance: the management of money and other assets.
Intrusion Detection System (IDS): is a software or hardware component that automates the intrusion detection process. It is designed to monitor the events occurring in a computer system and network and responds to events with signs of possible incidents of violations of security policies.
Intrusion Prevention System (IPS): on the other hand, is the technology of both detecting of intrusion or threat activities and taking preventive actions to seize them. It combines the knowledge of IDS in an automated manner.
Intrusion: It is an illegal act of entering possession of another’s property.
Management Information System (MIS): Information system that generates accurate timely and organized information so that manager and other user can make decision, solve problem supervise activities and track progress.
Password: A special code used by user to gain access to the database or a research.
Prevention: Maintenance performed to stop fault occurring or developing into major detects.
Security: This helps to prevent unauthorized users from illegally accessing certain data in the database, it protects your data/ files.
Software: These are set of logically related instructions given to the computer to perform some specific task.
System: Is the collection of hardware and software, data information procedure and people.
Transaction: it is a business event that has a monetary impact on an entity’s financial statements, and is recorded as an entry in its accounting records.
Withdrawal: Receiving from a deposit made.