0704-883-0675     |      dataprojectng@gmail.com

Comparative Study of Network Authentication Methods in Federal University, Lokoja, Kogi State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Federal University, Lokoja, Kogi State, strong and efficient authentication methods are crucial to maintaining a secure digital environment and protecting sensitive academic, administrative, and personal data. Given the increase in cyber threats targeting university networks, the adoption of robust network authentication mechanisms is essential for safeguarding network access (Sani et al., 2024).
Various network authentication methods, including password-based, two-factor authentication (2FA), biometric authentication, and Public Key Infrastructure (PKI)-based systems, offer distinct benefits and challenges. Password-based authentication, though common, is often susceptible to security breaches. In contrast, two-factor authentication provides an added layer of security but may introduce user experience challenges. Biometric authentication offers strong security by verifying unique physical traits but can be expensive to implement. Understanding the comparative strengths and weaknesses of these methods is critical for selecting the most appropriate solution for the university’s needs.
This study will compare different network authentication methods currently used at Federal University, Lokoja, to determine which offers the best balance of security, ease of use, and cost-effectiveness.

Statement of the Problem
The university’s network faces potential security vulnerabilities due to inconsistent or outdated authentication methods. A comprehensive evaluation of various authentication methods is needed to identify the most secure and efficient solution for the university's users, improving access control and reducing the risk of unauthorized network access.

Objectives of the Study

  1. To compare the effectiveness of different network authentication methods used at Federal University, Lokoja.

  2. To identify the strengths and weaknesses of each authentication method in terms of security, usability, and cost.

  3. To recommend the most suitable network authentication method for Federal University, Lokoja.

Research Questions

  1. What network authentication methods are currently in use at Federal University, Lokoja?

  2. How do the various authentication methods compare in terms of security and usability?

  3. Which authentication method is most suitable for the university’s network in terms of cost and efficiency?

Scope and Limitations of the Study
This study will focus on evaluating network authentication methods within the infrastructure of Federal University, Lokoja, Kogi State. It will compare methods such as password-based, two-factor authentication, biometric, and PKI systems. The limitations include the focus on authentication within the university's local network and the exclusion of external or cloud-based authentication systems.

Definitions of Terms

  • Network Authentication: The process of verifying the identity of users or devices to grant them access to a network.

  • Two-Factor Authentication (2FA): A security process that requires two forms of identification before granting access to a network or system.

  • Biometric Authentication: The use of unique physical characteristics, such as fingerprints or facial recognition, to verify an individual’s identity.

  • Public Key Infrastructure (PKI): A set of policies and technologies used to create, manage, and validate digital certificates that provide secure authentication.





Related Project Materials

The effect of leadership effectiveness on business banking performance: A case study of Union Bank Nigeria, Lagos

Background of the Study
Leadership effectiveness is a critical determinant of business banking performance. Union Bank Nige...

Read more
THE IMPACT OF COST MANAGEMENT ON ORGANIZATIONAL CHANGE

ABSTRACT

THE IMPACT OF COST MANAGEMENT ON ORGANIZATIONAL CHANGE

This study investigates the impact of cost management on organi...

Read more
An Investigation of the Impact of Game Theory Applications on Competitive Strategy in Nigeria

Background of the Study
Game theory provides a formal framework for understanding strategic interactions among rational dec...

Read more
THE IMPACT OF LEADERSHIP ON TEAM PERFORMANCE

THE IMPACT OF LEADERSHIP ON TEAM PERFORMANCE

This study examines the impact of leaders...

Read more
An evaluation of substance use and its sociocultural determinants in Esan Central Local Government Area, Edo State

Background of the Study
Substance use remains a significant public health concern globally, and in Esan Central Local Gove...

Read more
An Investigation of the Impact of Econometric Techniques on Investment Strategies in Nigeria

Background of the Study
Investment strategies in Nigeria have evolved considerably with the integration of econometric tec...

Read more
STRUCTURAL DETAILING IN REINFORCED CONCRETE OF A THREE BEDROOM DETACH DUPLEX,

ABSTRACT

In structural detailing, the project is initiated by the structural engineer. The architectura...

Read more
REGULATING SOCIAL MEDIA AS A WAY OF CHECKING HATE SPEECH IN NIGERIA

BACKGROUND OF THE STUDY

The emergence of globalization has made the world a global village as proposed...

Read more
A comparative study of email segmentation and personalization on campaign success: Evidence from a subscription service in Lagos, Nigeria

Background of the study
Email marketing remains a vital channel for subscription services, with segmentation and personaliz...

Read more
An appraisal of the role of loyalty rewards in customer retention in retail business: A case study of supermarkets in Zamfara State

Background of the Study

Loyalty programs have become an integral part of retail strategies aimed at enh...

Read more
Share this page with your friends




whatsapp