0704-883-0675     |      dataprojectng@gmail.com

Analysis of Insider Threats and Network Security Measures in Federal University, Wukari, Taraba State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study

Insider threats pose one of the most significant risks to network security in universities, as they involve individuals within the organization who misuse their access privileges to compromise sensitive information and systems. According to recent studies, insider threats are responsible for a substantial portion of data breaches and network security incidents (Wang et al., 2024). In a university setting, where academic data, research, and personal information are stored and exchanged, the potential for damage is immense. Federal University, Wukari, Taraba State, like many higher education institutions, faces the challenge of protecting its network from both intentional and unintentional insider threats.

Despite efforts to safeguard network infrastructure, the dynamic nature of university environments, with multiple stakeholders including students, faculty, and staff, creates vulnerabilities. Insider threats often stem from a lack of awareness, inadequate access controls, or disgruntled employees who intentionally exploit their access to systems for personal gain. Understanding the nature of these threats and developing appropriate network security measures are essential to protect the integrity and confidentiality of the university’s data. This study seeks to analyze the current network security posture at Federal University, Wukari, in relation to insider threats and suggest measures to mitigate such risks.

Statement of the Problem

While Federal University, Wukari, has implemented several security measures to protect its network, the risks associated with insider threats remain inadequately addressed. Insiders with legitimate access to sensitive data may unintentionally or intentionally compromise the security of the network, leading to data breaches, theft, or system misuse. This study aims to investigate the effectiveness of current network security measures and propose solutions to better protect the university from insider threats.

Objectives of the Study

  1. To assess the current network security measures in place at Federal University, Wukari, and identify vulnerabilities to insider threats.

  2. To analyze the role of insider threats in compromising network security within the university.

  3. To propose and evaluate strategies for mitigating insider threats and strengthening network security.

Research Questions

  1. What are the primary insider threats that affect network security at Federal University, Wukari?

  2. How effective are the current network security measures in mitigating insider threats?

  3. What strategies can be implemented to reduce the risk of insider threats within the university’s network?

Significance of the Study

This study will provide Federal University, Wukari, with valuable insights into the nature of insider threats and help identify vulnerabilities in its existing security measures. By implementing the recommendations derived from the study, the university can better safeguard its network and sensitive data, reducing the potential for costly security breaches.

Scope and Limitations of the Study

The study is limited to an analysis of insider threats and network security measures at Federal University, Wukari. It will focus on data security, access controls, and threat monitoring systems, but will not extend to other areas of campus cybersecurity such as physical security or social engineering attacks. The research will only cover the university’s administrative network and not external collaborations or third-party services.

Definitions of Terms

  • Insider Threats: Threats to network security posed by individuals within the organization, such as employees or students, who exploit their access to sensitive information.

  • Network Security Measures: Tools, policies, and practices designed to protect network infrastructure and sensitive data from cyberattacks or unauthorized access.

  • Access Control: Mechanisms used to regulate who can access specific resources in a network.


 





Related Project Materials

A Study on the Efficiency of Chatbot Systems in Customer Service: A Study of Telecom Firms in Nasarawa State

Background of the Study

Chatbot systems have become an integral part of customer service in various industries, leveraging artificial int...

Read more
AN EVALUATION OF FACTORS INFLUENCING COMMUNITY PARTICIPATION IN IMMUNIZATION

ABSTRACT

The study aims to assess the factors that impact community involvement in immunisation, with a...

Read more
The Effect of Electoral Disenfranchisement on Minority Groups in Sokoto North Local Government Area, Sokoto State

Background of the Study

Electoral disenfranchisement remains a pressing issue in democratic societies,...

Read more
Enhancing Public Health Awareness Through AI-Generated Motion Graphics in Minna, Niger State

Background of the Study
Public health awareness is critical for promoting healthy behaviors and preventing disease outbrea...

Read more
AN ASSESSMENT OF PUBLIC RELATION AS AN AID TO SUCCESSFUL GOVERNMENT BUSINESS ADMINISTRATION

BACKGROUND OF THE STUDY

The word "public relations" has already been defined by several autho...

Read more
A CRITICAL SURVEY OF THE COVID-19 PANDEMIC AND ITS IMPACTS AND EFFECTS ON CONSTRUCTION PROJECTS IN NIGERIA

Background of the study

The construction sector makes a considerable contribution to the economy, and i...

Read more
The Role of Development Journalism in Promoting Sustainable Agriculture in Ningi LGA, Bauchi State

Chapter One: Introduction

1.1 Background of the Study

An Investigation of Mobile Banking System Innovations on Expanding Digital Outreach in Banking: A Case Study of Ecobank Nigeria

Background of the Study
Mobile banking innovations are key drivers of digital transformation in the banking sector. Ecobank...

Read more
An assessment of mobile content strategies on user interaction: A case study of a news app in Abuja.

Background of the study   
Mobile content strategies are critical for news apps striving to capt...

Read more
An assessment of neurocognitive markers in bilingual language switching among Nigerian adolescents

Background of the Study

Bilingual language switching is a dynamic cognitive process that involves the activation and inhibition of compet...

Read more
Share this page with your friends




whatsapp