Background of the Study
Network authentication is the process of verifying the identity of users or devices attempting to access a network, ensuring that only authorized individuals or systems can connect to and use network resources. In academic institutions such as Federal University, Lokoja, Kogi State, strong and efficient authentication methods are crucial to maintaining a secure digital environment and protecting sensitive academic, administrative, and personal data. Given the increase in cyber threats targeting university networks, the adoption of robust network authentication mechanisms is essential for safeguarding network access (Sani et al., 2024).
Various network authentication methods, including password-based, two-factor authentication (2FA), biometric authentication, and Public Key Infrastructure (PKI)-based systems, offer distinct benefits and challenges. Password-based authentication, though common, is often susceptible to security breaches. In contrast, two-factor authentication provides an added layer of security but may introduce user experience challenges. Biometric authentication offers strong security by verifying unique physical traits but can be expensive to implement. Understanding the comparative strengths and weaknesses of these methods is critical for selecting the most appropriate solution for the university’s needs.
This study will compare different network authentication methods currently used at Federal University, Lokoja, to determine which offers the best balance of security, ease of use, and cost-effectiveness.
Statement of the Problem
The university’s network faces potential security vulnerabilities due to inconsistent or outdated authentication methods. A comprehensive evaluation of various authentication methods is needed to identify the most secure and efficient solution for the university's users, improving access control and reducing the risk of unauthorized network access.
Objectives of the Study
To compare the effectiveness of different network authentication methods used at Federal University, Lokoja.
To identify the strengths and weaknesses of each authentication method in terms of security, usability, and cost.
To recommend the most suitable network authentication method for Federal University, Lokoja.
Research Questions
What network authentication methods are currently in use at Federal University, Lokoja?
How do the various authentication methods compare in terms of security and usability?
Which authentication method is most suitable for the university’s network in terms of cost and efficiency?
Scope and Limitations of the Study
This study will focus on evaluating network authentication methods within the infrastructure of Federal University, Lokoja, Kogi State. It will compare methods such as password-based, two-factor authentication, biometric, and PKI systems. The limitations include the focus on authentication within the university's local network and the exclusion of external or cloud-based authentication systems.
Definitions of Terms
Network Authentication: The process of verifying the identity of users or devices to grant them access to a network.
Two-Factor Authentication (2FA): A security process that requires two forms of identification before granting access to a network or system.
Biometric Authentication: The use of unique physical characteristics, such as fingerprints or facial recognition, to verify an individual’s identity.
Public Key Infrastructure (PKI): A set of policies and technologies used to create, manage, and validate digital certificates that provide secure authentication.
ABSTRACT
The purpose of this paper is to empirically investigate the effect which capital structure cho...
Background of the Study
Diplomatic communication is critical in shaping international perceptions and maintaining bilatera...
Background of the Study
Peer education has emerged as a promising strategy for HIV prevention, particularly among young pe...
ABSTRACT: The benefits of early childhood education on cultural competence are...
ABSTRACT
This study was carried out on the impact of POS businesses in reducing unemployment rate in Nigeria using Asaba...
ABSTRACT
Since the transformation of the Organization of African Unity (OAU) to African Union (A.U.) various measures were adopted by the...
Background of the Study
Local governments in Nigeria are essential for grassroots development and servi...
Background of the Study
In Okrika Local Government Area, Rivers State, the belief in ancestral spirits plays a significant...
THE IMPACT OF TECHNOLOGY ON INTERNATIONAL ACCOUNTING PRACTICES
ABSTRACT
This research aims to investigate (1) the influen...
Background of the Study
Health infrastructure is a cornerstone of effective maternal healthcare. In Imo St...