Background of the Study
Network encryption is essential for safeguarding sensitive data transmitted over a network, ensuring confidentiality and protecting against unauthorized access. Federal University, Gashua, Yobe State, like many academic institutions, relies heavily on its network for communication, academic research, and the storage of confidential student and faculty information. However, with the increasing sophistication of cyberattacks, the university's reliance on secure communication protocols is critical to maintaining data integrity and user privacy.
The university may be using multiple encryption standards, including AES, RSA, and TLS, across its network infrastructure. However, understanding the strengths and weaknesses of these encryption methods, as well as determining which offers the best combination of security and performance, is crucial for optimizing the campus network's security posture. A comparative study of these encryption standards will provide a clear evaluation of their suitability for different applications within the university, including online academic resources, email communications, and remote access.
This study aims to assess various encryption standards used at Federal University, Gashua, to determine their effectiveness in protecting the university's network and identifying any performance trade-offs associated with implementing each protocol.
Statement of the Problem
Federal University, Gashua, currently employs various encryption standards across its network infrastructure, but the effectiveness, performance, and suitability of these standards have not been comprehensively evaluated. This may lead to inefficiencies in network performance or potential vulnerabilities that could jeopardize the security of sensitive data.
Objectives of the Study
To evaluate the encryption standards currently used at Federal University, Gashua.
To compare the effectiveness and performance of different encryption standards in terms of security and network speed.
To recommend the most suitable encryption standard(s) for various use cases at the university.
Research Questions
What encryption standards are currently being used in Federal University, Gashua’s network?
How do different encryption standards compare in terms of security and network performance?
Which encryption standard is most suitable for different applications within the university?
Scope and Limitations of the Study
This study will focus on evaluating the encryption standards used within the internal network infrastructure at Federal University, Gashua. External networks and third-party encryption solutions are excluded from the scope. Limitations include potential challenges in testing encryption standards under real-time network conditions and varying traffic loads.
Definitions of Terms
Encryption Standards: Protocols or algorithms designed to secure data by converting it into an unreadable format for unauthorized users.
AES (Advanced Encryption Standard): A symmetric encryption algorithm widely used for secure data transmission.
RSA (Rivest-Shamir-Adleman): An asymmetric encryption algorithm used for secure data transmission.
TLS (Transport Layer Security): A cryptographic protocol used to secure communications over a computer network.
Background of the Study
Religious beliefs significantly shape cultural and social behaviors, including participation in school-based acti...
ABSTRACT: This research investigates the impact of early childhood education on young children's understanding of food culture. Educating...
ABSTRACT
This study examined the effect of Store design on the material handling of an organisation, taking PHCN Kaduna as the case study...
ABSTRACT
The study is an investigation into the ”Effect of Nigerian films on Christian Youths in Pentecostal Churches in Kaduna sta...
Background of the Study
Causal inference methods have emerged as a critical advancement in the field of policy evaluation,...
Background of the Study
Extracurricular activities are a vital aspect of the holistic development of university students,...
Background of the Study
Effective school management plays a crucial role in the successful implementation and promotion of...
Background of the Study :
The Nigerian Export–Import Bank (NEXIM) has been instrumental in shaping trade finance in N...
Abstract: THE IMPACT OF FORENSIC ACCOUNTING IN CONTRACT DISPUTES AND BREACH OF CONTRACT CASES
This research assesses the impact of forens...
Background of the study
The acquisition and utilization of electronic information resources in academic...