Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Federal University, Lokoja, Kogi State, strong and efficient authentication methods are crucial to maintaining a secure digital environment and protecting sensitive academic, administrative, and personal data. Given the increase in cyber threats targeting university networks, the adoption of robust network authentication mechanisms is essential for safeguarding network access (Sani et al., 2024).
Various network authentication methods, including password-based, two-factor authentication (2FA), biometric authentication, and Public Key Infrastructure (PKI)-based systems, offer distinct benefits and challenges. Password-based authentication, though common, is often susceptible to security breaches. In contrast, two-factor authentication provides an added layer of security but may introduce user experience challenges. Biometric authentication offers strong security by verifying unique physical traits but can be expensive to implement. Understanding the comparative strengths and weaknesses of these methods is critical for selecting the most appropriate solution for the university’s needs.
This study will compare different network authentication methods currently used at Federal University, Lokoja, to determine which offers the best balance of security, ease of use, and cost-effectiveness.
Statement of the Problem
The university’s network faces potential security vulnerabilities due to inconsistent or outdated authentication methods. A comprehensive evaluation of various authentication methods is needed to identify the most secure and efficient solution for the university's users, improving access control and reducing the risk of unauthorized network access.
Objectives of the Study
To compare the effectiveness of different network authentication methods used at Federal University, Lokoja.
To identify the strengths and weaknesses of each authentication method in terms of security, usability, and cost.
To recommend the most suitable network authentication method for Federal University, Lokoja.
Research Questions
What network authentication methods are currently in use at Federal University, Lokoja?
How do the various authentication methods compare in terms of security and usability?
Which authentication method is most suitable for the university’s network in terms of cost and efficiency?
Scope and Limitations of the Study
This study will focus on evaluating network authentication methods within the infrastructure of Federal University, Lokoja, Kogi State. It will compare methods such as password-based, two-factor authentication, biometric, and PKI systems. The limitations include the focus on authentication within the university's local network and the exclusion of external or cloud-based authentication systems.
Definitions of Terms
Network Authentication: The process of verifying the identity of users or devices to grant them access to a network.
Two-Factor Authentication (2FA): A security process that requires two forms of identification before granting access to a network or system.
Biometric Authentication: The use of unique physical characteristics, such as fingerprints or facial recognition, to verify an individual’s identity.
Public Key Infrastructure (PKI): A set of policies and technologies used to create, manage, and validate digital certificates that provide secure authentication.
Background of the Study
Leadership effectiveness is a critical determinant of business banking performance. Union Bank Nige...
ABSTRACT
THE IMPACT OF COST MANAGEMENT ON ORGANIZATIONAL CHANGE
This study investigates the impact of cost management on organi...
Background of the Study
Game theory provides a formal framework for understanding strategic interactions among rational dec...
THE IMPACT OF LEADERSHIP ON TEAM PERFORMANCE
This study examines the impact of leaders...
Background of the Study
Substance use remains a significant public health concern globally, and in Esan Central Local Gove...
Background of the Study
Investment strategies in Nigeria have evolved considerably with the integration of econometric tec...
ABSTRACT
In structural detailing, the project is initiated by the structural engineer. The architectura...
BACKGROUND OF THE STUDY
The emergence of globalization has made the world a global village as proposed...
Background of the study
Email marketing remains a vital channel for subscription services, with segmentation and personaliz...
Background of the Study
Loyalty programs have become an integral part of retail strategies aimed at enh...