<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Evaluation of Computer and Network Security Strategies: A Case study of Nigerian Banks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ogunwobi, Z. O. (Ph.D.),</string-name>
          <email>ogunwobizac@yahoo.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Folorunso, S. O.</string-name>
          <email>bamidelekeke@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alebiosu, O. B.</string-name>
          <email>boladealeb@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Olabisi Onabanjo University</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Olabisi Onabanjo University</institution>
          ,
          <addr-line>Ago-Iwoye</addr-line>
          ,
          <country country="NG">Nigeria.</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Olabisi Onabanjo University</institution>
          ,
          <addr-line>Ogun State.</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>7</fpage>
      <lpage>9</lpage>
      <abstract>
        <p>It has been identified that financial institutions are one of the major users of Information Technology hence the need to evaluate effective use of the computer security strategies. This study aimed at evaluating the effectiveness of computer and network security strategies employed in Nigerian banks. This study was led by the following objectives; to determine and assess the security strategies that are put in place by Nigerian banks, to suggest solutions that would improve the effectiveness of the evaluated security strategies, to identify the effect of the various security strategies on the integrated banking system. This study employed the use of online questionnaires as a means of data collection. The study majorly focused on computer security strategies employed by the banks, and how effective the implemented security strategies have been. The strategies include passwords, antivirus, firewalls, encryption, intrusion detection systems and intrusion prevention systems, and it was mentioned that the integrated banking systems used by Nigerian banks has a certain security level thereby aiding the computer systems security in general, the study also revealed that Nigerian banks rarely experience malicious attacks of any form on their systems. The study findings revealed that Nigerian banks are implementing at least five computer security strategies</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Cross-computing tools and</title>
      <sec id="sec-1-1">
        <title>CCS Concepts</title>
        <p>• General and reference
techniques ➝Evaluation</p>
      </sec>
      <sec id="sec-1-2">
        <title>INTRODUCTION</title>
        <p>
          All over the world, the development and growth of the economy is
majorly dependent on the financial systems, as they happen to be
the major users of information and communication technology.
The level of development of this financial systems and efficiency
in performing their roles, depends largely on the introduction and
effectiveness of new technological media, which would aid
customer satisfaction and convenience. [
          <xref ref-type="bibr" rid="ref2">1</xref>
          ].
        </p>
        <p>The introduction of information and communication technology in
efficient service delivery in the banking and financial sector is
known as electronic banking (e-banking). Information and
communication technology is the mechanization of steps,
processes, actions, and information gathering using the computer,
telecommunication machines, special purpose software and
supporting devices such as Point of Sales (POS) machines and
credit cards.</p>
        <p>
          The competitiveness and complexity of the banking sector
environment in the 21st century, can be characterized by
unpredictable, epileptic and changing economic climate of the
world. [
          <xref ref-type="bibr" rid="ref3">2</xref>
          ] Established that, business competitiveness can only be
sustained, when banks and financial systems change from the
traditional and old modelled way of operation, which is likened to
“bricks and mortar” or “paper and biro” into a more advanced and
technological approach, likened to “clicks and portal” or
“computers and internet” Information and communication
technology (ICT) is at the middle of this grand turning point of
banking and financial sector in the World and Nigeria today.
Banks and financial systems at home and abroad have adopted
electronic banking (e-banking) due to the progression in
information and communication technology methods, and a means
of remaining abreast in this information age which also aids
efficient customer service. [
          <xref ref-type="bibr" rid="ref4">3</xref>
          ].
        </p>
        <p>The banking sector all over the world and Nigeria banks are also
adapting new innovations in information technology such as
ebanking and e-banking puts an end to endless queue in the banking
halls, and encourages electronic transfer of funds, this done one
internet enable devices and e-banking activated accounts, this done
between individuals and financial institutions, the exchange of
cash and keeping of large sums of money at home has totally been
discouraged, cheques and other negotiable items are also rarely
encouraged. In the world today, Point of Sales Machines (POS),
Automated Teller Machine (ATM), credit and debit cards, with
passwords, biometric scanners and personal identification numbers
(PIN) are now means of paying for goods and services or transfer
of funds, whenever and wherever the need arises.</p>
        <p>
          The new advancements in the Nigerian Banking sector cannot be
done without the use of computers, networks and internet and
hence the need to protect the organization’s computer and network
from unwanted users and malicious attacks becomes very
important. Cybercrime and other unintended use which makes it
easy to steal a kobo from millions of bank accounts than traditional
or conventional bank robbery is becoming predominant despite the
positive impact of the advancement in information and
communication technology has on the society. [
          <xref ref-type="bibr" rid="ref5">4</xref>
          ]
Technology has progressed so much that it would be of no surprise
if your computers are hacked and you are completely unaware of
the reasons for it. Any organization should monitor its system for
potential unauthorized access and several kinds of attacks, in other
to safeguard sensitive information. [
          <xref ref-type="bibr" rid="ref6">5</xref>
          ].
        </p>
        <p>
          Banking sector is a trust-based institution, that requires an absolute
trust from her customers, upon this the banking sector should take
security issues as a special concern to continually earn the trust of
their customers, The need to tighten-up security and proper
management channels that could give opportunities for fraud and
malicious attacks such as: breach of privacy of customer data,
distributed denial of service attacks, and technological letdowns
created on electronic banking platforms becomes expedient.
Insecurity has been a major concern in the world’s most prominent
sector (finance), bank accounts, transactions and funds transfer are
tampered with as a result of this insecurity, which is constantly
being faced by operators of the banking sector. These experiences
have become totally unfavorable, which have made the total
adoption of technologies in the banking sector difficult. The
insecurity issue has been caused by the ripple effects malicious
attacks and threats like State-sponsored espionage, Distributed
denial of service (DDoS) attacks, password management, insider
threat, privacy laws and viruses among others [
          <xref ref-type="bibr" rid="ref1 ref7">6</xref>
          ]. Thus, this
research is aimed at evaluating the computer and network security
strategies employed by Nigerian banks. The following objectives
that were used to achieve the aim were: the determination and
identification of the security strategies which are being
implemented by banks in Nigeria, ascertaining the impact of
various integrated banking system on the total security of the
banking sector, to assess the security strategies employed by
Nigerian banks and also evaluate its effectiveness.
        </p>
        <p>
          An Important factor in an organization’s computer and network
system is security, because the computer connects to other
networks through the internet. An attack on the organization’s
computer can be possible from outside of the organization.
Therefore computer network security is important to prevent and
protect the organization from internal and external attacks. [
          <xref ref-type="bibr" rid="ref8">7</xref>
          ]
Computer and Network security is generally handled by the system
administrator or network administrator who implements some
security policies, software and hardware needed to protect the
entire computer system and its resources from any unauthorized or
unwanted access and usage and the system administrator also
ensure ensures accessibility to the resources for authorized usage.
The security system is based on layers of protection and consist of
multiple components consisting of monitoring, security software,
hardware and appliances. The security is the quality of state, when
a computer system is secure it means it is free from potential
danger. [
          <xref ref-type="bibr" rid="ref9">8</xref>
          ].
        </p>
        <p>
          The following are the security strategies being focused on and
implemented by Nigerian banks;
A firewall is a defined as a perimeter fencing which serves a
border or control mechanism. Blocking or stopping traffic from
entering into a computer system is the main purpose of a firewall,
traffic inside the computer could also be blocked by firewall as
well. Firewall serves as the first form of mechanism set up to
control intruder activity on the computer. Unauthorized or
malicious access in a computer network system can be prevented
by firewall. The implementation of firewalls is done on the
hardware or the software, or on both. [
          <xref ref-type="bibr" rid="ref10">9</xref>
          ]
The need for antivirus software is prompted by the wide spread of
malware on computer systems. [
          <xref ref-type="bibr" rid="ref11">10</xref>
          ] The presence of malware in a
computer system is detected by an antivirus installed in the
computer system, the purpose of the antivirus is to identify the
nature of the malware, and also remove the malware, which is also
a means of preventing the host from future infections from any or
similar malware and also dis-harming the host from malware. The
minimization of false positives (false alarms) and false negatives
(missed malware) is encouraged during the stage of detecting
malware in the system.
        </p>
        <p>
          Malicious activities that are targeted at computer network systems
can be identified and responded to by a process called Intrusion
detection system (IDS). From this definition, intrusion detection
can be seen as a process, which involves a system, individuals, and
tools. [
          <xref ref-type="bibr" rid="ref12">11</xref>
          ] To reduce the risk of attacks precautionary measures
needs to be put in place. Preventing all attacks seems practically
impossible but could be achieved with the right measures put in
place. Malicious activities can be easily identified and diagnosed
with a process which works similar to a burglar alarm, Intrusion
detection. Intrusion detection combines three activities majorly to
monitor, analyze, and respond. [
          <xref ref-type="bibr" rid="ref13">12</xref>
          ].
        </p>
        <p>
          Intrusion Prevention System (IPS) is a defense system that is
primarily network based, it properly combines the proactive
technique of IDS with that of firewall as a result of increasing
global network. The proactive technique of the system is to prevent
malicious attacks before they enter into the system, it verifies and
examines various information records. The offending data is
blocked and logged when an attack is identified on such data. [
          <xref ref-type="bibr" rid="ref14">13</xref>
          ].
Encryption scrambles data thereby making the data very hard to
find useful by the intruder, the interpretation of a scrambled data is
meaningless if the intruder does not know how the scrambling was
done. Encryption or scrambling is indeed an essential tool in
providing computer and network security [
          <xref ref-type="bibr" rid="ref15">14</xref>
          ]. Encryption clearly
addresses the importance of data confidentiality. Additionally,
encryption makes it difficult to easily alter or change data, because
it has been scrambled this makes it generally hard to read or
understand thereby ensuring data integrity. [
          <xref ref-type="bibr" rid="ref15">14</xref>
          ].
        </p>
        <p>
          Passwords have become the only barrier between just any user and
one’s personal information and they most common and widely
used form of authentication. Several programs are available for
easy download, which makes it easier for attackers to “guess” or
“crack” a password, a very good password and keeping the
password confidential makes very difficult for an unauthorized
person to gain access to your information. [
          <xref ref-type="bibr" rid="ref16">15</xref>
          ].
        </p>
        <p>
          Banking applications generally known as Core Banking System
(CBS) are believed to have a level of security incorporated in
them, which helps militate against attacks on the applications and
several servers attached, to this effect the need to review banking
system application security becomes very important. [
          <xref ref-type="bibr" rid="ref17">16</xref>
          ]
Application security helps put stringent measures and controls in
place on an organization’s applications, which reduce the risk from
intruders using the application and the risk associated with the
authorized user using it.
        </p>
        <p>
          In a secure Core Banking System proper management of
information security is required and this can only be delivered a
vendor organization that manages information. Implementation of
Information Security Management System (ISMS) on core banking
systems makes the work easier for organization as specific areas
and processes have been covered within the organization [
          <xref ref-type="bibr" rid="ref17">16</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>RESEARCH METHODOLOGY</title>
        <p>The population of study is limited to computer security experts and
information technology department staff in Nigerian banks. Eleven
(11) commercial banks and one (1) mortgage bank randomly filled
the online questionnaire with a total of 30 respondents. The banks
are: Ecobank, Guaranty Trust Bank, Skye Bank Nigeria PLC,
Sterling Bank, Firstbank Bank, Fidelity Bank, Access Bank,
Keystone Bank, Wema Bank, Zenith Bank, Diamond Bank and
Haggai Mortgage Bank, while two (2) respondents did not provide
the name of their banks.</p>
        <p>Three factors were considered when choosing the sample. The first
was that, the respondent must be an IT/ICT staff of a Nigerian
bank, the second was to have an idea of the bank’s computer
security strategies and the third was the willingness of the
respondents to cooperate, because some of the staff do not readily
have interest in filling the online questionnaires.</p>
        <p>An online questionnaire (http://bit.ly/1J6baWS) was administered
for data collection which was designed for computer security
experts and information technology department staff in Nigerian
banks. An online questionnaire was preferred and chosen because
the questionnaire was targeted at bank officials, who are very
mobile and they always have access to the internet, and with the
help of social media campaigns a wider number of respondents
could be easily be reached.</p>
        <p>Section A which contained the personal data of the staff, such as;
age, bank type. It provided the background information needed in
answering the research questions. It also contained questions based
on the years of experience in the banking sector, years of
experience with current bank and name of bank. Section B which
contained achievement test items. The questions were twelve
multiple choice items in computer security.</p>
        <p>The criteria that were used to compare Avast, McAfee and
Webroot antivirus were: On-demand scan refers to a manual scan
which is being initiated by the user on the entire or certain
segments of the computer system, here the user initiates the scan
and decides what part of the system should be scanned or if the
entire system should be scanned.</p>
        <p>On-access scan refers to an automatically initiated scan which the
product itself initiates without any external interference, it scans
every file whenever it is created and/or whenever it is modified,
and here the antivirus initiates a scan immediately a new file is
created on the system.</p>
        <p>CloudAV gives an efficient automatically initiated scan that is
performed on the cloud storage, and this happens frequently.
Email Security gives our emails the desired security from viruses
and malware, thereby preventing penetration, through our email.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Intrusion Detection System (IDS): the process of identifying and</title>
      <p>responding to malicious activities targeted at computing and
network resources.</p>
    </sec>
    <sec id="sec-3">
      <title>Intrusion Prevention System (IPS): is a defense system that is</title>
      <p>primarily network based, it properly combines the proactive
technique of IDS with that of firewall as a result of increasing
global network.</p>
      <p>AntiSpam gives us the needed efficient protection from malicious
attacks such as: spam, scam and phishing attacks.</p>
      <p>Web protection comes in when surfing the internet and protect the
user from infected and malicious URLs, numerous phishing
websites, this also protects us by giving us online banking
protection and online identity protection (privacy).</p>
      <sec id="sec-3-1">
        <title>3. RESULT AND DISCUSSION</title>
        <p>This section is focused on the presentation and discussion of result
obtained during the course of this research. The data was collected
with particular reference to the questions raised earlier on. The
purpose of this study was to evaluate how effective computer and
network strategies put in place by Nigeria banks. This study strives
to provide answers to the under-listed research questions:
i. What banks do the respondents work for?
ii. What are the years of experience of the respondents?
iii. What Computer security strategies are implemented?
iv. Why is a particular anti-virus preferred to other antivirus
software?
v. How often has the bank suffered malicious attacks?
vi. Why is a particular integrated banking system (Core</p>
        <p>Banking System) preferred to other CBS software?
How effective are the computer strategies implemented?</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.1 Bank of the respondents</title>
        <p>Figure 1 showed the number of respondents that filled the
questionnaire from each bank. It was presented in Figure 1 showed
that Ecobank and Wema Bank for a larger percentage of the banks
of respondent, while other percentages were spread across ten
different banks while three respondents did not mention the names
of their banks. There are about nineteen (19) commercial banks in
Nigeria as at November 2015, eleven (11) commercial banks
participated in this survey, and this indicates that over 50% of
Nigerian commercial banks was involved in this research.
oN… liityFed itrsFaB… tsyeKo…</p>
        <p>…
ykSe iaoDm sscceA</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.2 Years of experience of the respondents?</title>
        <p>Figure 2 summarizes the findings on years of experience of the
respondents in the banking, and this ascertains that most of the
respondents are either newly recruited staff or they have not stayed
too long in the banking sector. This indicates that there level of
knowledge of the bank’s security strategies implemented could be
limited as they have not spent so much time in that particular bank
and this could also be a determinant of the level of management of
the organization’s implemented security strategies, this also shows
that the respondents with not very long experience in a particular
bank might not be aware of the malicious attacks experienced by
the bank in the past.</p>
        <p>Years of Experience
50
0
1 -4 yrs
5 - 9 yrs
10 - 14yrs</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.3 What Computer security strategies are implemented?</title>
        <p>Figure 3 shows that over 50% of the respondents implemented
Intrusion Detection and Prevention in their company, 60%
implemented Encryption, 76.6% Firewall, while almost 100% were
using Passwords and Antivirus. It can then be deduced that since
all the percentages of yes of respondents on each of the five
security strategies in Figure 3 are at an average of 75.33%, while
average percentage of No and Not sure are 10 % and 14.67%
respectively, we could then conclude that Nigerian banks
implement all five security strategies.</p>
        <p>Security Stragies Implemented
%
3
3
.
3</p>
      </sec>
      <sec id="sec-3-5">
        <title>3.4 Antivirus software preference</title>
        <p>Figure 4 showed the type of antivirus each Nigerian bank uses and
it revealed Avast and MacAfee antivirus are predominantly used
while a small percentage of usage are spread sparsely across all
other antivirus. Thus, the need to compare why Avast and
MacAfee antivirus is preferred over the other and while some have
less patronage, which would in turn answer our research question
four that is; Why is a particular anti-virus preferred to other
antivirus software?
The comparison of why Avast and McAfee are the most preferred
and Webroot, the least patronized is showed in Table 2 from
Figure 4. The comparison tools ranged from on-demand scan,
CloudAV, on-access scan, boot-time scan, firewall, Email security,
Intrusion Detection System (IDS), Intrusion Prevention System
(IPS), Anti-spam and web protection.</p>
        <p>It can then be deduced from the result presented in Table 2 that
Avast and McAfee was chosen over the Webroot antivirus, seeing
that the free versions of the Avast still has some security features
already integrated in them and the Premier version of the Avast
antivirus has almost all security features integrated in it except for
the intrusion prevention system and the AntiSpam. McAfee on the
other hand, for it McAfee Antivirus does not have CloudAV,
firewalls, IDS, IPS, AntiSpam and web protection which still gives
it a fair chance of usage but the McAfee Internet security has all
security features integrated into them which might not even require
user to install other security strategies.</p>
        <p>Webroot, that happens to be the least on the chart in Figure 4
which was also compared alongside with Avast and McAfee,
happens not to have not too many security features integrated into
it secure anywhere antivirus other than on-demand scan and
onaccess scan, this shows the very reason why Webroot antivirus
happened to be in the bottom section of Figure 4.</p>
        <p>We would then conclude based on the comparison of different
antivirus software on Table 2 it shows that Avast Antivirus
software has a high level of in-built security, which could be the
reason why it is the most preferred by Nigerian bank</p>
      </sec>
      <sec id="sec-3-6">
        <title>3.5 How often has the bank suffered malicious attacks?</title>
        <p>The result of how often the bank suffers from malicious attack
was presented and analysed in Table 2. It showed that on the
average, 47% of the respondents from Nigerian banks have
never experienced any malicious attacks of any form on their
equipment or personal accounts, and just 37% only experienced
malicious attacks less often, while only about 15% say that their
banks often experience malicious attacks on their equipment.
This indicates that the security strategies implemented could be
effective since malicious attacks where not very often.</p>
      </sec>
      <sec id="sec-3-7">
        <title>4.7 How effective are the computer strategies implemented?</title>
        <p>Figure 6 below depicts that computer and network security
strategies which is currently deployed by Nigerian Banks are
effective. Based on the facts there have been no instances of
malicious activities and absolutely no cases of it in most banks
of the respondents, it was cited by 65% of the valid responses
that the security strategies have been effective, hence the highest
response being on effective.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Effectiveness of Computer Security Strategies</title>
      <p>%
7
6
.
6
3
%
3
3
.
3
3
banking systems have in-built security tools, and all Nigerian
banks need to implement an effective and reliable Integrated
banking system which would enhance the computer security
strategies. All Nigerian banks are using integrated banking
system, and from our study it shows that a particular banking
application is majorly used by Nigerian banks, which is
Flexcube, which could mean that Flexcube is more reliable,
efficient and secure.</p>
      <p>
        The general research aim, which was to know how effective
computer and network security strategies have been after
implementation, and from the result of our research question
seven, it shows that computer and network security strategies
implemented in Nigerian banks are effective. This contradicted
[
        <xref ref-type="bibr" rid="ref19">18</xref>
        ] who cited that the computer security strategies implemented
are not effective due to several examples of banking related
frauds that are still very rampant and [
        <xref ref-type="bibr" rid="ref20">19</xref>
        ] who also stated that
efraud is a way Nigerian banks still keeps losing money which is
due to ineffective computer and network security strategies. An
effective mixture of computer and network security strategies
are being implemented by Nigerian banks, examples of such
strategies include passwords, encryption, intrusion detection and
prevention systems, firewalls, integrated banking application.
      </p>
      <sec id="sec-4-1">
        <title>5. CONCLUSION</title>
        <p>This research evaluated the effectiveness of computer and
network security strategies being used by banks in Nigeria. And
the following conclusions were drawn, from the results
presented earlier. First, computer and network security strategies
implemented in Nigerian banks are; passwords, encryption,
firewalls, intrusion detection system and intrusion prevention
system and about half of the respondents were not sure if they
use intrusion detection and prevention system. Secondly, from
our research the evaluation, proved that almost all Nigerian
banks are fully and effectively implementing the computer and
network security strategies. However, only about 15.33% of the
respondents from Nigerian banks experience malicious attacks
of any form in the bank’s system and about 84.66% asserts that
they never or rarely experience malicious attacks of any form.
Finally, from our presented results, we then conclude that
Nigerian banks are using effective computer and network
strategies after, implementing almost all security strategies and
they rarely experience malicious attacks of any form.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>6. REFRENCES</mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Ofanson</surname>
            <given-names>E. J.</given-names>
          </string-name>
          (
          <source>Ph.D.)</source>
          ,
          <string-name>
            <surname>Aigbokhaevbolo O. M. (Ph.D.</surname>
          </string-name>
          ) and
          <string-name>
            <surname>Enubulu</surname>
            <given-names>G. O.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>The financial system in Nigeria: An overview of banking sector reforms</article-title>
          .
          <source>AAU JMS</source>
          Vol.
          <volume>1</volume>
          , December
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Chau</surname>
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Lai</surname>
            <given-names>V.</given-names>
          </string-name>
          , (
          <year>2003</year>
          ).
          <article-title>An empirical investigation of the determinants of user acceptance of internet banking</article-title>
          .
          <source>Journal of organizational Computing and electronic commerce</source>
          ,
          <volume>13</volume>
          (
          <issue>2</issue>
          ),
          <fpage>123</fpage>
          -
          <lpage>145</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Tunmibi</surname>
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Falayi</surname>
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2013</year>
          ),
          <article-title>IT security and e-banking in Nigeria, Greener journal of internet, information &amp; communication system</article-title>
          .
          <source>Vol</source>
          <volume>1</volume>
          (
          <issue>3</issue>
          ), pp
          <fpage>061</fpage>
          -
          <lpage>065</lpage>
          ,
          <year>August</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Wada</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Longe</surname>
            <given-names>O.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Danquah</surname>
          </string-name>
          (
          <year>2012</year>
          ),
          <article-title>actions speaks louder than words - understanding cybercriminals behaviour using criminological theories</article-title>
          .
          <source>Journal of internet banking and commerce, April</source>
          , vol.
          <volume>17</volume>
          , no 1
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Courtney</surname>
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2014</year>
          ),
          <article-title>Importance of network security for business organization, avalan wireless blog</article-title>
          , May 7
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Zimucha</surname>
            <given-names>T.</given-names>
          </string-name>
          , Ngonidzashe
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Kerina</surname>
          </string-name>
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Elijah</surname>
          </string-name>
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Petronella M. Tinovimbanashe</surname>
          </string-name>
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,(
          <year>2012</year>
          ),
          <article-title>An evaluation of the effectiveness of e-banking security strategies in Zimbabwe: a case study of Zibabwean commercial banks</article-title>
          .
          <source>Journal of internet banking and commerce, December</source>
          , vol.
          <volume>17</volume>
          , no.
          <volume>13</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>[7] CholatipYawut and PhattarapongKeawpipop (</article-title>
          <year>2011</year>
          )
          <article-title>The Future of Organization's Computer Network security for the next five years (2011- 2015) by using the Delphi Technique</article-title>
          .
          <source>International Conference on Information and Electronics Engineering</source>
          , Volume 6
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [8]
          <string-name>
            <surname>AartiRamehSonone</surname>
          </string-name>
          , (
          <year>2015</year>
          ), Security Techniques Used in Computer Networking,
          <source>Indian Streams Research Journal</source>
          , Volume
          <volume>5</volume>
          , Issue 9.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Adeyinka</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2008</year>
          ),
          <article-title>"Internet Attack Methods and Internet Security Technology,"</article-title>
          <source>Modeling &amp; Simulation</source>
          ,
          <year>2008</year>
          .AICMS 08. Second Asia International Conference on, vol., no., pp.
          <fpage>77</fpage>
          ‐
          <lpage>82</lpage>
          ,
          <fpage>13</fpage>
          ‐15 May
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Peter</surname>
            <given-names>Szor</given-names>
          </string-name>
          , (
          <year>2005</year>
          ), Art of Computer Virus Research and Defense, Addison-Wesley.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kruegel</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Valeur</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vigna</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <article-title>Intrusion Detection and Correlation Challenges and Solution</article-title>
          , XIV, 118P
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Richard</surname>
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2005</year>
          ),
          <article-title>Tao of Network Security Monitoring: Beyond Intrusion Detection</article-title>
          , Addison-Wesley.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Hu</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>W.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Zhao</surname>
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2011</year>
          ), “
          <article-title>The Design and Implementation of Trusted Communication Protocol for Intrustion Prevention System</article-title>
          ,
          <source>” Journal of Convergence Information Technology</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>62</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Charles</surname>
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Pfleeger</surname>
          </string-name>
          , Shari Lawrence Pfleeger (
          <year>2003</year>
          )
          <article-title>Security in Computing, Chapter 1; Is There A Security Problem in Computing.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [15]
          <string-name>
            <surname>US-CERT</surname>
          </string-name>
          (
          <year>2013</year>
          ),
          <source>Security Tips; Choosing and Protecting Passwords Retrieved August 13th</source>
          ,
          <year>2015</year>
          from, https://www.us-cert.gov/ncas/tips/ST04-002
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>SEC</given-names>
            <surname>Consult</surname>
          </string-name>
          (
          <year>2012</year>
          ),
          <article-title>Application Security of Core Banking System, A first reality check</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Hawkins</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yen</surname>
            ,
            <given-names>D.C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Chou</surname>
            ,
            <given-names>D.C.</given-names>
          </string-name>
          (
          <year>2000</year>
          ).
          <article-title>Awareness and challenges of internet security</article-title>
          .
          <source>Information Management and computer security</source>
          ,
          <volume>8</volume>
          (
          <issue>3</issue>
          ),
          <fpage>131</fpage>
          -
          <lpage>143</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Fatima</surname>
            <given-names>A.</given-names>
          </string-name>
          , (
          <year>2011</year>
          ).
          <article-title>E-banking security issues - Is there a solution in biometrics?</article-title>
          <source>Journal of Internet Banking and Commerce</source>
          ,
          <volume>16</volume>
          (
          <issue>2</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Umokoro</surname>
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2013</year>
          ),
          <article-title>Why Nigerian Banks will keep losing money to e-fraud, ThisdayLive 21st November</article-title>
          , retrieved October 20, from http://thisdaylive.com/articles/whynigerian-banks
          <article-title>-will-keep-losing-money-</article-title>
          <string-name>
            <surname>to-</surname>
          </string-name>
          e-fraud/164810/
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>