Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Federal University, Lokoja, Kogi State, strong and efficient authentication methods are crucial to maintaining a secure digital environment and protecting sensitive academic, administrative, and personal data. Given the increase in cyber threats targeting university networks, the adoption of robust network authentication mechanisms is essential for safeguarding network access (Sani et al., 2024).
Various network authentication methods, including password-based, two-factor authentication (2FA), biometric authentication, and Public Key Infrastructure (PKI)-based systems, offer distinct benefits and challenges. Password-based authentication, though common, is often susceptible to security breaches. In contrast, two-factor authentication provides an added layer of security but may introduce user experience challenges. Biometric authentication offers strong security by verifying unique physical traits but can be expensive to implement. Understanding the comparative strengths and weaknesses of these methods is critical for selecting the most appropriate solution for the university’s needs.
This study will compare different network authentication methods currently used at Federal University, Lokoja, to determine which offers the best balance of security, ease of use, and cost-effectiveness.
Statement of the Problem
The university’s network faces potential security vulnerabilities due to inconsistent or outdated authentication methods. A comprehensive evaluation of various authentication methods is needed to identify the most secure and efficient solution for the university's users, improving access control and reducing the risk of unauthorized network access.
Objectives of the Study
To compare the effectiveness of different network authentication methods used at Federal University, Lokoja.
To identify the strengths and weaknesses of each authentication method in terms of security, usability, and cost.
To recommend the most suitable network authentication method for Federal University, Lokoja.
Research Questions
What network authentication methods are currently in use at Federal University, Lokoja?
How do the various authentication methods compare in terms of security and usability?
Which authentication method is most suitable for the university’s network in terms of cost and efficiency?
Scope and Limitations of the Study
This study will focus on evaluating network authentication methods within the infrastructure of Federal University, Lokoja, Kogi State. It will compare methods such as password-based, two-factor authentication, biometric, and PKI systems. The limitations include the focus on authentication within the university's local network and the exclusion of external or cloud-based authentication systems.
Definitions of Terms
Network Authentication: The process of verifying the identity of users or devices to grant them access to a network.
Two-Factor Authentication (2FA): A security process that requires two forms of identification before granting access to a network or system.
Biometric Authentication: The use of unique physical characteristics, such as fingerprints or facial recognition, to verify an individual’s identity.
Public Key Infrastructure (PKI): A set of policies and technologies used to create, manage, and validate digital certificates that provide secure authentication.
Abstract: THE IMPACT OF INVESTIGATIVE TECHNIQUES IN FORENSIC ACCOUNTING ENGAGEMENTS
This research investigates the impact of investigativ...
Background of the Study
Cybersecurity threats in higher education institutions have grown significantly, with universities...
Background of the Study
Customer service quality is a critical determinant of business success, particularly in the food...
Chapter One: Introduction
1.1 Background of the Study
Media bias, defined as the perceived or actual partiality in news reporti...
Background of the Study
Asset management is a cornerstone of banking profitability, and innovative approaches in this field...
Background of the Study
Maintenance charges, while a vital revenue stream for banks, also contribute to significant operating expenses. S...
Background of the Study
The escalation of cyber threats in the digital era necessitates the adoption of advanced security s...
Chapter One: Introduction
ABSTRACT
Crime has been a major subject of concern throughout human history. No society is free of crime and criminals. The Nigeria Polic...
Background of the Study
Artificial Intelligence (AI) has revolutionized digital marketing by enabling businesses to pers...