International Journal of Innovative Research in Engineering and Management
Year: 2015, Volume: 2, Issue: 3
First page : ( 1) Last page : ( 6)
Online ISSN : 2350-0557
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Dr Isa Ali Ibrahim
Accessing the internet by many users in organizations creates threat to many companies due to the frequent flow of unwanted messages. These problems also affect centers that provide internet access in a confine environment such as cyber cafe. The need to be able to monitor client who logs into the network becomes very essential. The purpose of the study is collecting of useful information from various parts of the network so that the network can be managed and controlled using the collected information. The study attempts to investigate the design of a typical cyber café time management system to help cafe administrators effectively manage clients' time and trying to examine how people that gain illegal access into network resources can be prevented. The study involves relevant respondents of the ICT Centre of ATBU, using structured questionnaire of data analysis. The result of the study showed that client/server model facilities interface monitoring enhances security. It also allows connection, fault, account and traffic monitoring. The effect of client/server model increases and enhances cyber cafe time management. The study also recommends quality network monitoring should be put in place, security/ authentication should be increased and enhanced, better timing should be put in place for remote users, data encryption should be adopted and lastly firewalls should also be critically observed .
[1] Aladelusu, B. (2008). "Types of Network" Ibadan, Press Ibadan. Pp 2-9.
[2] Aresenault, A. & Houseley, R. (2000). Protection Profile for Certificate Issuing and Toronto. Canada. Pp. 11-25.
[3] Bishop, M. (2002). "Computer Security, Art and Science" Pearson Education Inc. New York. Pp. 11-31.
[4] Dhilon, N. K. & Ansari, U. (2012). "Enterprise Network Traffic Monitoring, Analysis and Reporting Using WINPCAP TOOL with JPCAP API". International Journal of Advanced Research in Computer Science and Software Engineering. Volume 2, Issue 11, November, 2012.
[5] Edmund, W. (2003). Hacking Wireless Network for Dummies. The Hacker Quarterly, Volume 22 No 1. June, 2003.
[6] Fatunla, C. (2003). "Gocybetix timer. "A café time Management Sysytem for Automated Timing Control." London Pitman Publishing.
[7] Hughes, T. (2005). " An Introduction to Computer Security: The NIST Handbook Provide Guidelines on General Security Procedures.
[8] Jelen, R. (2003). Secure Routing in Sensor Networks: Attacks and Counter Measures. In Proceeding of the 1st Analysis IEEE International Workshop on Ensor Network Protocols and Applications.
[9] Ibrahim, I. A. (2013). “An Empirical Investigation into Managerial Attitude as a Barrier to Adoption of State-of-the-art Upstream Information Systems by Nigerian Indigenous Oil Companies”. The Macrotheme Review: A Multidisciplinary Journal of Global Macro Trends, Paris, France, Volume 2, No 1.pp.1-7.
[10] Ibrahim, I. A. (2014). A Theoretical and Empirical Investigation of the Barriers to the Adoption of the State-of-theart Information Systems in the Nigerian Indigenous Oil Companies. A PhD Thesis at the Robert Gordon University, United Kingdom.
[11] Jelen, T. & Russ, K. (2003). "Client/Server Networks." MindPride Consulting. April, 2003. Pp. 1-7
[12] John, S. (2006). "Security Analysis and Enhancement of Computer Operating Systems." National Bureau of Standards, Washington DC.
[13] Jones, D. (2011). The Five Essential Elements of Application Performance Monitoring, sponsored by Quest Software, Realtime Publishers, Realtime NEXUS, The Digital Library for IT Professional. Also available at http://www.quest.com/landing/?id=5008.
[14] Pressman, R. S. (2001). "System Analysis and Software Engineering." Bankok Thailand, Mcgraw Hill.
[15] Subrata, M. & Aurel, L. (1996). "Objective-Driven Monitoring for Broadband Networks." Ottawa, IEEE Transactions.
[16] Sullivan, F. (2006). iLink Communications. Stacie Jones. Washington (No much details).
Assistant Professor,Faculty of Computer Science and Information Systems Islamic University of Madinah, 42351, Kingdom of Saudi Arabia
No. of Downloads: 14 | No. of Views: 2291
