Background of the study:
Cloud computing has revolutionized the way academic institutions manage and store data, enabling universities to scale their resources efficiently and cost-effectively. With cloud computing, Federal University, Birnin Kebbi, Kebbi State, has been able to enhance its computing capabilities, offering students and faculty greater flexibility and access to educational resources and research materials. The shift toward cloud-based solutions has also facilitated collaboration and data sharing among academics, contributing to improved learning outcomes. However, cloud computing also introduces a unique set of network security threats that can potentially jeopardize the confidentiality and availability of sensitive academic data (Olayemi et al., 2023).
The security risks associated with cloud computing are a significant concern for educational institutions. Data stored on cloud platforms are often subject to external threats, such as data breaches, unauthorized access, and cyber-attacks. In academic environments, these risks are amplified as sensitive student information, research data, and institutional records are stored on the cloud (Zhao et al., 2024). As more universities adopt cloud computing services, including the Federal University, Birnin Kebbi, it is essential to understand the security threats posed by these systems and evaluate the strategies for mitigating these risks. Despite the numerous benefits of cloud computing, the growing number of cyber-attacks targeting cloud infrastructures requires continuous vigilance and proactive security measures.
Statement of the Problem:
The Federal University, Birnin Kebbi, has transitioned to cloud computing services to enhance its operational efficiency and improve resource management. However, the security threats associated with cloud computing remain a major challenge. The university has faced several incidents involving unauthorized access to cloud-stored academic materials and concerns over the integrity of stored data. These security risks stem from factors such as inadequate encryption, insufficient access controls, and vulnerabilities within the cloud service provider's infrastructure (Peterson & Zhang, 2023). As a result, there is a need to evaluate and address the security threats associated with cloud computing at the university to ensure the protection of sensitive academic data and maintain the trust of its stakeholders.
Objectives of the Study:
To evaluate the network security threats associated with cloud computing at Federal University, Birnin Kebbi.
To analyze the impact of these threats on the confidentiality and integrity of academic data stored in the cloud.
To propose strategies for enhancing the security of cloud computing systems at the university.
Research Questions:
What are the primary network security threats associated with the use of cloud computing at Federal University, Birnin Kebbi?
How do these security threats affect the university's academic data stored on cloud platforms?
What strategies can be implemented to mitigate these security threats and ensure the safe use of cloud computing at the university?
Significance of the Study:
This study is significant as it contributes to understanding the network security threats associated with cloud computing in academic institutions. By evaluating the threats at Federal University, Birnin Kebbi, the research will offer practical recommendations for securing cloud-based academic resources, ensuring that sensitive data remains protected. The findings will help university administrators develop better security policies and collaborate with cloud service providers to enhance the security of their cloud infrastructures.
Scope and Limitations of the Study:
The scope of the study is limited to the evaluation of network security threats related to cloud computing at Federal University, Birnin Kebbi, Kebbi State. The study will focus on identifying the types of security risks faced by the university’s cloud computing services and assessing the impact of these threats on the university's academic data. Limitations include the reliance on the current cloud service provider's infrastructure and the assessment of security measures in place, which may not reflect future advancements in cloud security technologies.
Definitions of Terms:
Cloud Computing: The delivery of computing services, including storage, networking, databases, and software, over the internet.
Network Security Threats: Risks that compromise the security and integrity of a network, including unauthorized access, data breaches, and attacks on cloud infrastructures.
Data Breach: Unauthorized access to or disclosure of sensitive information stored on a network or cloud platform.
Background of the Study
The adoption of International Financial Reporting Standards (IFRS) in Nigeria has been a landmar...
ABSTRACT
This study explores THE ROLE OF INTERNATIONAL ACCOUNTING FOR BUSINESS COMBINATIONS AND CONSOLIDATIONS, focusing on enhancing fin...
Background of the Study
Academic fraud, including falsified scholarship applications, is a growing concern in universities, as fraudulent...
Background of the Study
Parent-teacher associations (PTAs) are essential collaborative bodies that bridge the gap between...
ABSTRACT
Cassava, being an important staple, is widely grown in Nigeria. Potential contribution of Cassava Enterprise (CE) to Socioeconom...
ABSTRACT
This work evolved out of the need to provide an in-depth understanding of the economics of debt in Nigeria. This study aims at a...
Tuberculosis (TB) is one of the leading infectious diseases worldwide, with t...
Chapter One: Introduction
1.1 Background of the Study
Employee motivation is a critical deter...
ABSTRACT
Auditing is continually changing and developing to meet the needs of the business environment it serves. The r...
Background of the Study
Religious beliefs and practices play a significant role in shaping political attitudes and behavior...