Background of the Study
Research institutions generate and store large volumes of sensitive data, including experimental results, intellectual property, and confidential academic records. The security of this data is paramount to maintaining research integrity and preventing unauthorized access or data breaches. In recent years, research institutions worldwide have faced increasing cybersecurity threats, including ransomware attacks, data leaks, and insider threats (Adegbite et al., 2024). Ensuring secure data storage has become a crucial priority in higher education and research institutions.
Federal University, Birnin Kebbi, houses various research centers that store critical information on digital platforms. However, the institution faces challenges such as limited security infrastructure, lack of standardized encryption mechanisms, and vulnerability to cyber threats (Olaniyi & Yusuf, 2023). Traditional storage methods, including on-premises servers, are often prone to security breaches due to outdated security measures and human errors. Cloud storage, although widely adopted, introduces concerns about data sovereignty and third-party access.
This study aims to design a secure data storage network tailored to research institutions at Federal University, Birnin Kebbi. The proposed solution will incorporate advanced encryption techniques, multi-factor authentication, and intrusion detection mechanisms to ensure data confidentiality, integrity, and availability.
Statement of the Problem
Despite the critical need for secure data storage, many research institutions in Federal University, Birnin Kebbi, rely on insecure storage solutions. Weak authentication mechanisms, unencrypted data storage, and lack of real-time monitoring increase the risks of data breaches. A robust data storage network tailored for research institutions is required to address these security gaps and enhance data protection measures.
Objectives of the Study
To assess the existing data storage security challenges in research institutions at Federal University, Birnin Kebbi.
To design a secure data storage network incorporating encryption, authentication, and intrusion detection techniques.
To evaluate the effectiveness of the proposed secure data storage network in preventing unauthorized access and data breaches.
Research Questions
What are the key security challenges affecting data storage in research institutions at Federal University, Birnin Kebbi?
How can a secure data storage network be designed to protect sensitive research data?
What measures can be implemented to enhance data integrity and prevent unauthorized access?
Significance of the Study
This study will contribute to enhancing the security infrastructure of research institutions by providing a secure data storage framework. It will assist IT administrators and researchers in protecting intellectual property and maintaining research integrity.
Scope and Limitations of the Study
The study focuses on secure data storage network design for research institutions in Federal University, Birnin Kebbi, Kebbi State. It does not cover general cybersecurity measures such as malware protection or endpoint security.
Definitions of Terms
Data Encryption: The process of converting information into a secure format to prevent unauthorized access.
Intrusion Detection System (IDS): A security mechanism that monitors network traffic for suspicious activities.
Multi-Factor Authentication (MFA): A security measure that requires multiple verification steps for access.
ABSTRACT
This study was carried out to examine the impact of social media in the fight against misinfor...
Background Of The Study
The term "office automation" generally refers to the use of integrate...
ABSTRACT
This study analyzed the effect of forest resources exploitation on economic well-being of farming households. In carrying out th...
Background of the Study
Regulatory policy enforcement is critical to ensuring robust bank governance and maintaining stakeholder confiden...
OBJECTIVE OF THE STUDY
The aim of this study is to design and implement a database driven online virtual marketplace wit...
Background of the Study
Brand storytelling is a strategic communication approach that uses narrative techniques to conve...
This project report describes a mobile android based job finder and applier. There is a crisis in Nig...
Background of the Study
Voter education campaigns are essential for promoting informed electoral participation and stren...
Background of the Study
The use of artificial intelligence (AI) in education has led to the development of AI-enabled teach...
Background of the Study
Online political marketing has emerged as a potent tool for influencing public policy support by...