EHICAL HACKING AND CYBER SECURITY IN NIGERIA TELECOMMUNICATION - Project Ideas | Grossarchive.com

Explore Project Topics on: EHICAL HACKING AND CYBER SECURITY IN NIGERIA TELECOMMUNICATION

Related Works

ABSTRACT mso-fareast-font-family:Calibri;mso-fareast-theme-font:minor-latin;mso-ansi-language: EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA'>The Information and Communication Technology (ICT) policy identified ICT as the bedrock of national survival and development in a rapidly changing global environment. The prevalence and rapid... Continue Reading
INDUSTRY: ISSUES AND SOLUTIONS CHAPTER ONE INTRODUCTION 1.1   BACKGROUND TO THE STUDY Cybersecurity through ethical hacking plays an important role in the ongoing development of telecommunication industry, as well as Internet services (Odinma, 2010). Enhancing cybersecurity and... Continue Reading
: ISSUES AND SOLUTIONS ABSTRACT The study examines the issues and solutions of ethical hacking and cyber security in Nigerian telecommunication industry, the study has the following objectives,To examine the issues of ethical hacking and cyber security in Nigeria... Continue Reading
is a fast growing pace in the society today and as a result of that, its growth is becoming more and more widespread. According to the 2015 (ISC) Global Information Security Workforce Study, a shortfall of 1.8 million cybersecurity jobs will happen by 2022 cite mat 1. Allegedly, the most common reason for this fact is the lack of... Continue Reading
ABSTRACT The study examined sales promotion as a persuasive activity hence is the direct and indirect communication used by firms to influence present and... Continue Reading
Hacking means to attack systems, networks and applications by exploiting their weaknesses, in order to gain unauthorized access to data and systems. • What are the goals of hacking? • Ethical hacking is the use of hacking knowledge, skills tools and techniques to demonstrate the true exploitable vulnerabilities of a system for the purpose of... Continue Reading
EVALUATION OF THE RELATIONSHIP BETWEEN E-BANKING AND CYBER CRIME (A CASE STUDY OF FIDELITY BANK PLC) ABSTRACT The study evaluates the impact of the relationship between e-banking and cyber crime, the study has the following objectives, to evaluate the relationship between e-banking and cyber crime, to identify factors militating against effective... Continue Reading
ABSTRACT The aim of this study was to examine and analyze the emergence of cyber bulling in Nigeria and its effect on self-esteem among adolescence . The study was carried out among four senior secondary school students in Lagos metropolis. Specifically, Birch Freeman High School, Anglican Girl Senior Secondary School, Lagos Progressive Senior... Continue Reading
ABSTRACT The aim of this study was to examine and analyze the emergence of cyber bulling in Nigeria and its effect on self-esteem among adolescence . The study was carried out among four senior secondary school students in Lagos metropolis. Specifically, Birch Freeman High School, Anglican Girl Senior Secondary School, Lagos Progressive Senior... Continue Reading
TABLE OF CONTENTS DECLARATION .............................................................................................................. i APPROVAL .................................................................................................................... ii DEDICATION... Continue Reading
TABLE OF CONTENTS DECLARATION . APPROVAL ii DEDICATION Iii ACKNOWLEDGEMENT iv TABLE OF CONTENTS V LIST OF TABLES AND FIGURES ,,iii LIST OF ACRONYMS ix ABSTRACT CHAPTER ONE:INTRODUCTION 1.0 Introduction I 1.1 Background of the study 1.2 Statement of the Problem 3 1.3 Purpose of the Study 4 1.4 Specific objectives 4 1.5 Research question 4 1.6... Continue Reading
PRELIMINARY PAGES Title page Title page Table of content Table of content CHAPTER ONE: GENERAL INTRODUCTION CHAPTER ONE: GENERAL INTRODUCTION 1.1 Introduction1.1 Introduction 1.2 Statement of the research problem 1.2 Statement of the research problem 1.3 Objectives of the study 1.3 Objectives of the study 1.4 Significance of the study 1.4... Continue Reading
PRELIMINARY PAGES Title page Title page Table of content Table of content CHAPTER ONE: GENERAL INTRODUCTION CHAPTER ONE: GENERAL INTRODUCTION 1.1 Introduction1.1 Introduction 1.2 Statement of the research problem 1.2 Statement of the research problem 1.3 Objectives of the study 1.3 Objectives of the study 1.4 Significance of the study 1.4... Continue Reading
Chapter One             INTRODUCTION 1.1         Background of the study 1.2         Statement of the problem 1.3         Purpose of the study 1.4         Significance of study 1.5         Research questions 1.6         Scope of study 1.7         Limitation of study... Continue Reading
Computers have become a way of life for today’s high society. Many aspects of modern life that we have come to accept as common place would not be possible if there were no computers. Today computers are use extensively in many areas of business, industry, science, education etc.                           The major... Continue Reading
Table of contents Declaration .............................................................................................................................................. ii Approval ................................................................................................................................................ iii Dedication... Continue Reading
ABSTRACT Rampant cyber incidences in Kenya targeting banks call for mediations beyond existing cybersecurity principles. This quantitative study sought to collate multi-domain variables from previous works to develop a framework for measuring cyber-resilience in Kenyan banks known as the Cyber-resilience Framework for Banks (CRF4Banks). The... Continue Reading
Rampant cyber incidences in Kenya targeting banks call for mediations beyond existing  cybersecurity principles. This quantitative study sought to collate multi-domain  variables from previous works to develop a framework for measuring cyber-resilience  in Kenyan banks known as the Cyber-resilience Framework for Banks (CRF4Banks).  The... Continue Reading
This is a business case on how to establish a cyber cafe.... Continue Reading
This is a business case on how to establish a cyber cafe.... Continue Reading
CHAPTER ONE INTRODUCTION 1.1. Background Of The Study Intelligence simply refers the collection of information of military or political value. It is common knowledge that nationsrequire intelligence about their immediate environment and that of other nations. This is necessary because, in order to guarantee their security, they need to keep track... Continue Reading
ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
ABSTRACT Information is an important aspect of life. Vital information is the life wire or backbone of any organization. From sports statistics to the latest stock market price such facts keep people abreast of time. Computing, printing, photography and some recording are all forms of automatic information processing. In all of these processed ,... Continue Reading
ABSTRACT The practice of employee welfare programme has now become a popular phenomenon of the total personnel policy of any organization. The programme involve given extra benefit to employee to supplement their ways to a cost to the employee. They are important to both the organization and the employee from employee, point of view it is... Continue Reading
ABSTRACT The practice of employee welfare programme has now become a popular phenomenon of the total personnel policy of any organization. The programme involve given extra benefit to employee to supplement their ways to a cost to the employee. They are important to both the organization and the employee from employee, point of view it is... Continue Reading
EMPLOYMENT WELFARE PROGRAMME IN NIGERIA (A CASE STUDY OF NIGERIA TELECOMMUNICATION LIMITED (NITEL) ABSTRACT The practice of employee welfare programme has now become a popular phenomenon of the total personnel policy of any organization. The programme involve given extra benefit to employee to supplement their ways to a cost to the employee. They... Continue Reading
ABSTRACT This study was intended to analyze data mining techniques of telecommunication companies in Nigeria. This study was guided by the following objectives; to provide an overview on data mining. To examine the various data mining... Continue Reading
ABSTRACT The challenges faced by telecommunication industries are many, there is need to eliminate or curb some of these challenges and that is when a decision support system comes into play. A decision support system (DSS) is one which can aid to strategize management within industries to make vital decisions in relation to customer and network... Continue Reading
TABLE OF CONTENTS CHAPTER ONE INTRODUCTION 1.1Background to the Study 1.2 Statement of the Research Problem 1.3 Aim and Objectives of the Study 1.4 Research Questions 1.5 Research Hypotheses 1.6 Scope of the Study 1.7 Significance of the Study CHAPTER TWO LITERATURE REVIEW 2.1... Continue Reading
whatsappWhatsApp Us