0704-883-0675     |      dataprojectng@gmail.com

Analysis of Insider Threats and Network Security Measures in Federal University, Wukari, Taraba State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study

Insider threats pose one of the most significant risks to network security in universities, as they involve individuals within the organization who misuse their access privileges to compromise sensitive information and systems. According to recent studies, insider threats are responsible for a substantial portion of data breaches and network security incidents (Wang et al., 2024). In a university setting, where academic data, research, and personal information are stored and exchanged, the potential for damage is immense. Federal University, Wukari, Taraba State, like many higher education institutions, faces the challenge of protecting its network from both intentional and unintentional insider threats.

Despite efforts to safeguard network infrastructure, the dynamic nature of university environments, with multiple stakeholders including students, faculty, and staff, creates vulnerabilities. Insider threats often stem from a lack of awareness, inadequate access controls, or disgruntled employees who intentionally exploit their access to systems for personal gain. Understanding the nature of these threats and developing appropriate network security measures are essential to protect the integrity and confidentiality of the university’s data. This study seeks to analyze the current network security posture at Federal University, Wukari, in relation to insider threats and suggest measures to mitigate such risks.

Statement of the Problem

While Federal University, Wukari, has implemented several security measures to protect its network, the risks associated with insider threats remain inadequately addressed. Insiders with legitimate access to sensitive data may unintentionally or intentionally compromise the security of the network, leading to data breaches, theft, or system misuse. This study aims to investigate the effectiveness of current network security measures and propose solutions to better protect the university from insider threats.

Objectives of the Study

  1. To assess the current network security measures in place at Federal University, Wukari, and identify vulnerabilities to insider threats.

  2. To analyze the role of insider threats in compromising network security within the university.

  3. To propose and evaluate strategies for mitigating insider threats and strengthening network security.

Research Questions

  1. What are the primary insider threats that affect network security at Federal University, Wukari?

  2. How effective are the current network security measures in mitigating insider threats?

  3. What strategies can be implemented to reduce the risk of insider threats within the university’s network?

Significance of the Study

This study will provide Federal University, Wukari, with valuable insights into the nature of insider threats and help identify vulnerabilities in its existing security measures. By implementing the recommendations derived from the study, the university can better safeguard its network and sensitive data, reducing the potential for costly security breaches.

Scope and Limitations of the Study

The study is limited to an analysis of insider threats and network security measures at Federal University, Wukari. It will focus on data security, access controls, and threat monitoring systems, but will not extend to other areas of campus cybersecurity such as physical security or social engineering attacks. The research will only cover the university’s administrative network and not external collaborations or third-party services.

Definitions of Terms

  • Insider Threats: Threats to network security posed by individuals within the organization, such as employees or students, who exploit their access to sensitive information.

  • Network Security Measures: Tools, policies, and practices designed to protect network infrastructure and sensitive data from cyberattacks or unauthorized access.

  • Access Control: Mechanisms used to regulate who can access specific resources in a network.


 





Related Project Materials

An appraisal of asset management practices on boosting investment returns in banking: a case study of Keystone Bank

Background of the Study
Asset management practices are pivotal in determining the investment returns and overall financial...

Read more
An assessment of teacher self-efficacy in early childhood education in Dawakin Tofa Local Government Area, Kano State

Background of the Study
Teacher self-efficacy, defined as the belief in one’s ability to effectivel...

Read more
The effect of small arms proliferation on communal clashes in Zangon Kataf Local Government Area, Kaduna State.

Chapter One: Introduction

1.1 Background of the Study
The proliferation of small arms and light...

Read more
Investigating the Impact of Traditional Leadership on Community Economic Development in Nigeria

Background of the Study
Traditional leadership in Nigeria has long been a cornerstone of community organi...

Read more
The Impact of Pediatric Nurses’ Communication on Parental Compliance with Treatment in Borno State

Background of the Study

Effective communication between healthcare providers and caregivers is essent...

Read more
A Study on the Effect of Work-Life Balance Policies on Employee Retention in Nigeria

Background of the Study
Work-life balance policies are designed to harmonize professional responsibilities with personal w...

Read more
An Investigation of Shariah-Compliant Investment Opportunities in Islamic Banking

Background of the Study
Shariah-compliant investment opportunities are at the heart of Islamic banking, enabling investors...

Read more
A CRITICAL DISCOURSE ANALYSIS OF PRINT MEDIA DEPICTIONS OF INSURGENT ACTIVITIES IN NIGERIA

ABSTRACT

It has been observed that studies on insurgency in Nigeria have in the most parts been anchored on politics, law, economy, the e...

Read more
The Effect of Nursing Care on Patients with Depression: A Case Study of Federal Neuropsychiatric Hospital, Uselu, Edo State

Background of the Study

Depression is one of the most common and disabling mental health disorders, affecting millions o...

Read more
The impact of informal education on students' ability to manage their emotions in Riyom Local Government Area, Plateau State

Background of the Study
Emotional management is a critical skill for personal development, academic success, and effective...

Read more
Share this page with your friends




whatsapp