Background of the Study
Cybersecurity policies play a crucial role in protecting institutional networks, ensuring compliance, and safeguarding sensitive information. These policies outline best practices for network security, access control, data protection, and incident response (Adebayo & Okonkwo, 2024). However, the effectiveness of cybersecurity policies depends on their implementation, enforcement, and continuous evaluation.
Federal University, Lokoja, has established cybersecurity policies to protect its IT infrastructure. However, recent security incidents, including data breaches and phishing attacks, suggest that these policies may not be effectively enforced (Mustapha et al., 2023). Factors such as lack of user awareness, inadequate monitoring, and outdated policies contribute to cybersecurity vulnerabilities.
This study aims to investigate the effectiveness of cybersecurity policies in Federal University, Lokoja. It will assess policy implementation, identify gaps, and recommend strategies to enhance security compliance.
Statement of the Problem
Despite the existence of cybersecurity policies, Federal University, Lokoja, continues to experience cyber threats. The lack of regular policy reviews, poor enforcement, and insufficient user training contribute to security breaches. This study seeks to evaluate the effectiveness of current policies and recommend measures for improvement.
Objectives of the Study
To assess the effectiveness of cybersecurity policies at Federal University, Lokoja.
To identify challenges in policy implementation and enforcement.
To recommend strategies for improving cybersecurity policy effectiveness.
Research Questions
How effective are the cybersecurity policies at Federal University, Lokoja?
What challenges hinder the implementation of cybersecurity policies?
What measures can be adopted to improve cybersecurity policy enforcement?
Significance of the Study
The study will help Federal University, Lokoja, strengthen its cybersecurity policies, ensuring better compliance and protection against cyber threats. It will also guide IT administrators in policy enforcement and user awareness programs.
Scope and Limitations of the Study
The study focuses on cybersecurity policy effectiveness in Federal University, Lokoja, Kogi State. It does not cover technical security solutions such as firewalls or intrusion detection systems.
Definitions of Terms
Cybersecurity Policy: A set of rules and guidelines that govern IT security practices.
Policy Enforcement: The process of ensuring compliance with cybersecurity rules and guidelines.
Security Awareness Training: Programs designed to educate users on cybersecurity best practices.
Background of the Study
According to Kombo (2015), radio is an essential medium for bringing about social change t...
ABSTRACT
The study examined the influence of family background on the academic performance of senior se...
Background of the Study
School feeding programs have emerged as an innovative intervention to address bot...
Background of the Study
Social welfare institutions have emerged as critical actors in managing the complex process of chi...
Background of the Study
Venture capital (VC) financing has become a critical source of funding for startups globally, offer...
Background of the Study
Operational efficiency is critical to the profitability and sustainability of manufacturing firms, especially in...
ABSTRACT
The use of online advertisement in Nigerian market is increasing and businesses are more and m...
Background of the Study
Financial technology (FinTech) innovations have transformed financial services globally, and Nig...
Chapter One: Introduction
1.1 Background of the Study
Microcredit has become a vital tool for...
Background of the Study
Debit charge adjustments represent a critical pricing tool that banks use to balance revenue genera...