Background of the Study
Insider threats pose one of the most significant risks to network security in universities, as they involve individuals within the organization who misuse their access privileges to compromise sensitive information and systems. According to recent studies, insider threats are responsible for a substantial portion of data breaches and network security incidents (Wang et al., 2024). In a university setting, where academic data, research, and personal information are stored and exchanged, the potential for damage is immense. Federal University, Wukari, Taraba State, like many higher education institutions, faces the challenge of protecting its network from both intentional and unintentional insider threats.
Despite efforts to safeguard network infrastructure, the dynamic nature of university environments, with multiple stakeholders including students, faculty, and staff, creates vulnerabilities. Insider threats often stem from a lack of awareness, inadequate access controls, or disgruntled employees who intentionally exploit their access to systems for personal gain. Understanding the nature of these threats and developing appropriate network security measures are essential to protect the integrity and confidentiality of the university’s data. This study seeks to analyze the current network security posture at Federal University, Wukari, in relation to insider threats and suggest measures to mitigate such risks.
Statement of the Problem
While Federal University, Wukari, has implemented several security measures to protect its network, the risks associated with insider threats remain inadequately addressed. Insiders with legitimate access to sensitive data may unintentionally or intentionally compromise the security of the network, leading to data breaches, theft, or system misuse. This study aims to investigate the effectiveness of current network security measures and propose solutions to better protect the university from insider threats.
Objectives of the Study
To assess the current network security measures in place at Federal University, Wukari, and identify vulnerabilities to insider threats.
To analyze the role of insider threats in compromising network security within the university.
To propose and evaluate strategies for mitigating insider threats and strengthening network security.
Research Questions
What are the primary insider threats that affect network security at Federal University, Wukari?
How effective are the current network security measures in mitigating insider threats?
What strategies can be implemented to reduce the risk of insider threats within the university’s network?
Significance of the Study
This study will provide Federal University, Wukari, with valuable insights into the nature of insider threats and help identify vulnerabilities in its existing security measures. By implementing the recommendations derived from the study, the university can better safeguard its network and sensitive data, reducing the potential for costly security breaches.
Scope and Limitations of the Study
The study is limited to an analysis of insider threats and network security measures at Federal University, Wukari. It will focus on data security, access controls, and threat monitoring systems, but will not extend to other areas of campus cybersecurity such as physical security or social engineering attacks. The research will only cover the university’s administrative network and not external collaborations or third-party services.
Definitions of Terms
Insider Threats: Threats to network security posed by individuals within the organization, such as employees or students, who exploit their access to sensitive information.
Network Security Measures: Tools, policies, and practices designed to protect network infrastructure and sensitive data from cyberattacks or unauthorized access.
Access Control: Mechanisms used to regulate who can access specific resources in a network.
Background of the Study
Asset management practices are pivotal in determining the investment returns and overall financial...
Background of the Study
Teacher self-efficacy, defined as the belief in one’s ability to effectivel...
Chapter One: Introduction
1.1 Background of the Study
The proliferation of small arms and light...
Background of the Study
Traditional leadership in Nigeria has long been a cornerstone of community organi...
Effective communication between healthcare providers and caregivers is essent...
Background of the Study
Work-life balance policies are designed to harmonize professional responsibilities with personal w...
Background of the Study
Shariah-compliant investment opportunities are at the heart of Islamic banking, enabling investors...
ABSTRACT
It has been observed that studies on insurgency in Nigeria have in the most parts been anchored on politics, law, economy, the e...
Background of the Study
Depression is one of the most common and disabling mental health disorders, affecting millions o...
Background of the Study
Emotional management is a critical skill for personal development, academic success, and effective...