091-2230-8145     |      dataprojectng@gmail.com
1

1. ENHANCING PUBLIC CONFIDENCE IN FINANCIAL REPORTING, THE ROLE OF CORPORATE GOVERNANCE

ABSTRACT

This study examined the role of corporate governance in organizations, and how the public confidence can be restored in organization through financial reporting. The study aimed at ascertaining the extent to which financial helps organizations...

Read more

2. CRITICAL INFORMATION INFRASTRUCTURE PROTECTION TECHNIQUES IMPLEMENTATION AGAINST CYBER ATTACKS USING BIG DATA ANALYTICS (A CASE STUDY OF INEC & JAMB)

Introduction

In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...

Read more

3. Design and Implementation of an Intrusion Tolerant System

Abstract

The advancement of computers produce computing infrastructures which handle resources in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures becomes an attractive target for...

Read more

4. MULTI-LEVEL INTRUSION DETECTION AND LOG MANAGEMENT SYSTEM IN CLOUD COMPUTING

INTRODUCTION

As Green IT has been issued, many companies have started to find ways to decrease IT cost and overcome economic recession. Cloud Computing service is a new computing paradigm in which people only need to pay for use of services without cost of purchasing ph...

Read more

5. AN INVESTIGATION OF CHARACTERIZATION AND ISOLATION OF FUNGI ASSOCIATED WITH “SPOILED” TOMATOES IN GWAGWALADA

INTRODUCTION

Vegetables are an essential food product that are both economically important and nutritionally significant. Vegetables naturally play an important part in human nutrition by delivering the required growth factors in the form of vitamins and key minerals in...

Read more

6. AN INVESTIGATION ON THE EFFORT OF GOVERNMENT AND THE MANAGEMENT OF SECURITY PROBLEMS IN NIGERIA

Background of the study

After the civil war that broke out in 1970 in Nigeria, the country's security situation has been generally stable ever since. The people have peace, and they are able to travel freely from one section of the nation to another without being ha...

Read more

7. A CRITICAL INVESTIGATION OF SAFETY AND SECURITY THREATS IN HOSPITALITY INDUSTRIES IN CROSS RIVERS STATE (A CASE STUDY OF SOME SELECTED HOTELS IN CALABAR)

Background Of The Study

According to Chan (2022), safety is a state in which risks and conditions that might cause physiological, mental, or physical harm are limited to safeguard the health and well-being of individuals. It is an essential resource for...

Read more

8. DESIGN OF INTRUSION DETECTION AND PREVENTION SYSTEM IN MICRO FINANCE BANK IN IKOT EKPENE

Introduction

An intrusion detection system (IDS) analyses network traffic for unusual behaviour and alerts the system or network administrator if it detects it. In some situations, the IDS may respond to suspicious or malicious activity by prohibiting the user or source...

Read more

9. THE ASSESSMENT OF BIG DATA ANALYTICS ROLE AS A PROTECTION TECHNIQUE AGAINST CYBER ATTACKS (A CASE STUDY OF JAMB)

BACKGROUND OF THE STUDY

Cyber-attacks are constantly making headlines, putting countries, industries, and businesses at danger of security breaches. With society's reliance on technology and the introduction of the internet, things could get even wo...

Read more

10. MALICIOUS PROSECUTION UNDER THE NIGERIAN LAW

ABSTRACT

This work was preoccupied with the examination of malicious prosecution under the Nigerian law. It pointed out that malicious prosecution is an abuse of the process of the court by wrongfully setting the law in motion on a criminal charge. It is the malicious i...

Read more

11. INTRUSION DETECTION, AND PREVENTION SYSTEM USING GUFAX MICRO FINANCE BANK PLC, IKOT EKPENE AS A CASE STUDY

  1.   Introduction

An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity and alert the system or network administrator. In some cases the IDS may also respond to anomalous or malicious traffic by...

Read more

12. DEVELOPMENT OF A MODIFIED REAL-TIME FAULT-TOLERANT TASK ALLOCATION SCHEME FOR WIRELESS SENSOR NETWORKS

ABSTRACT

This research aimed at the development of a modified real-time fault-tolerant task allocation scheme (mRFTAS) for wireless sensor networks (WSNs), using active replication backup techniques. In WSNs, the sensor nodes are at risk of failure and malicious attacks (selective forwa...

Read more

13. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

 

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance i...

14. INFORMATION SECURITY ADHERENCE IN INSTITUTIONS OF HIGHER EDUCATION: A Case Study of American University of Nigeria

Abstract

Institution of higher education face a higher level of information security incidence and compromise such as data and information theft, malicious program infection, attack on the information systems infrastructure and computer network. The antagonistic impact of information se...

Read more

15. FEW-SHOT MALWARE DETECTION USING A NOVEL ADVERSARIAL REPROGRAMMING MODEL

ABSTRACT 

The increasing sophistication of malware has made detecting and defending against new strains a major challenge for cybersecurity. One promising approach to this problem is using machine learning techniques that extract representative features and train classification mod...

Read more

16. Forwarding loop attacks and counter measures in content centric networks

ABSTRACT

Content Centric Networking (CCN) is a novel networking approach that aims at overcoming some of the limitations of the current Internet. In particular, CCN aims at providing better security and privacy by focusing on the data rather than on the location of data. However, this n...

Read more

17. Understanding and Exploiting Design Flaws of AMD Secure Encrypted Virtualization

Abstract

Trusted Execution Environment (TEE) is a blooming direction in the cloud industry. Aiming at protecting cloud user’s data in runtime, TEE can enable a lot of new and foreseeable cloud use cases. While enclave-based TEEs such as Intel SGX suffer from a large effort of rewr...

Read more

18. DESIGN AND IMPLEMENTATION OF NETWORK SECURITY (A CASE STUDY OF UBA ENUGU)

ABSTRACT

Network Security is essential to any organization. This has been previously done by manual method. But this project is aimed at computerized Network Security to make the work easier. This is possible because of the advance improvement in information technology as pertaining pro...

Read more

19. THE DETECTION AND PREVENTION OF SNIFFING ON NETWORKS

ABSTRACT

With the presence of some faults in online protocols and operating systems, any person who is connected to a network, especially in a Local Area Network (LAN) can fall victim to his information getting monitored by another person that is connected to the same network. Due to th...

Read more

20. AI-DRIVEN TECHNIQUES FOR MALWARE AND MALICIOUS CODE DETECTION

ABSTRACT

Driven by considerable economic profits, there has been explosive growth of malware which has posed significant damages and finical losses to public users. The increasingly sophisticated malware call for new defensive techniques that are capable of protecting l...

Read more

21. DESIGN AND IMPLEMENTATION OF NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ABSTRACT

The objective of this project is to develop a network intrusion detection system that incorporates a decoy system, specifically a honeypot. This approach effectively addresses the challenges of false positives and false negatives, as they are not easily bypasse...

Read more
whatsapp