0704-883-0675     |      dataprojectng@gmail.com

Analysis of Insider Threats and Network Security Measures in Federal University, Wukari, Taraba State

  • Project Research
  • 1-5 Chapters
  • Abstract : Available
  • Table of Content: Available
  • Reference Style:
  • Recommended for :
  • NGN 5000

Background of the Study

Insider threats pose one of the most significant risks to network security in universities, as they involve individuals within the organization who misuse their access privileges to compromise sensitive information and systems. According to recent studies, insider threats are responsible for a substantial portion of data breaches and network security incidents (Wang et al., 2024). In a university setting, where academic data, research, and personal information are stored and exchanged, the potential for damage is immense. Federal University, Wukari, Taraba State, like many higher education institutions, faces the challenge of protecting its network from both intentional and unintentional insider threats.

Despite efforts to safeguard network infrastructure, the dynamic nature of university environments, with multiple stakeholders including students, faculty, and staff, creates vulnerabilities. Insider threats often stem from a lack of awareness, inadequate access controls, or disgruntled employees who intentionally exploit their access to systems for personal gain. Understanding the nature of these threats and developing appropriate network security measures are essential to protect the integrity and confidentiality of the university’s data. This study seeks to analyze the current network security posture at Federal University, Wukari, in relation to insider threats and suggest measures to mitigate such risks.

Statement of the Problem

While Federal University, Wukari, has implemented several security measures to protect its network, the risks associated with insider threats remain inadequately addressed. Insiders with legitimate access to sensitive data may unintentionally or intentionally compromise the security of the network, leading to data breaches, theft, or system misuse. This study aims to investigate the effectiveness of current network security measures and propose solutions to better protect the university from insider threats.

Objectives of the Study

  1. To assess the current network security measures in place at Federal University, Wukari, and identify vulnerabilities to insider threats.

  2. To analyze the role of insider threats in compromising network security within the university.

  3. To propose and evaluate strategies for mitigating insider threats and strengthening network security.

Research Questions

  1. What are the primary insider threats that affect network security at Federal University, Wukari?

  2. How effective are the current network security measures in mitigating insider threats?

  3. What strategies can be implemented to reduce the risk of insider threats within the university’s network?

Significance of the Study

This study will provide Federal University, Wukari, with valuable insights into the nature of insider threats and help identify vulnerabilities in its existing security measures. By implementing the recommendations derived from the study, the university can better safeguard its network and sensitive data, reducing the potential for costly security breaches.

Scope and Limitations of the Study

The study is limited to an analysis of insider threats and network security measures at Federal University, Wukari. It will focus on data security, access controls, and threat monitoring systems, but will not extend to other areas of campus cybersecurity such as physical security or social engineering attacks. The research will only cover the university’s administrative network and not external collaborations or third-party services.

Definitions of Terms

  • Insider Threats: Threats to network security posed by individuals within the organization, such as employees or students, who exploit their access to sensitive information.

  • Network Security Measures: Tools, policies, and practices designed to protect network infrastructure and sensitive data from cyberattacks or unauthorized access.

  • Access Control: Mechanisms used to regulate who can access specific resources in a network.


 





Related Project Materials

An examination of the effects of school location on students’ academic performance in secondary schools in Takum LGA, Taraba State

Background of the Study:
School location is a critical determinant of academic performance, influencing access to quality e...

Read more
An evaluation of digital media influence on political campaigns: Evidence from a political advertisement in Kano.

Background of the Study

Digital media has become a cornerstone of contemporary political campaigning, with political adv...

Read more
THE EFFECT OF INTERACTIVE AD FORMATS ON CONSUMER RESPONSE: A STUDY OF A MOBILE GAMING COMPANY IN PORT HARCOURT.

Background of the study:
Interactive ad formats engage consumers through dynamic elements such as games, quizzes, and augmented reality, enh...

Read more
ANALYSIS OF PRODUCTION SYSTEM DESIGN AND MANAGEMENT IN THE SOFT DRINK INDUSTRY

ABSTRACT

The utmost aim of this study is to clearly define the factors necessary for the design of an e...

Read more
An Appraisal of the Implementation of Infection Control Measures by Nurses in Kebbi State

Background of the Study

Infection control measures are crucial in healthcare settings to prevent the...

Read more
An Examination of the Relationship Between Fiscal Deficits and Economic Growth in Nigeria

Background of the Study
Fiscal deficits occur when government expenditures exceed revenues, and their management is critic...

Read more
IMPACT OF ADULT EDUCATION ON ELDERLY POPULATIONS

Abstract: This study examines the impact of adult education on elderly populations, focusing on how educational programs tailored for older ad...

Read more
An investigation of the effect of teacher absenteeism on students' performance in primary schools in Potiskum LGA, Yobe State

Background of the Study:
Teacher absenteeism has emerged as a critical issue in the educational sector, particularly in reg...

Read more
An Appraisal of Mentorship Programs and Their Effect on Career Growth in NNPC, Kwara State

Background of the Study

Mentorship programs are a widely recognized strategy for fostering career development and professional growth, es...

Read more
Accounting Information System in Monitoring Rural Development Programs in Karu Local Government Area

Background of the Study

Rural development programs aim to improve the living standards of communities i...

Read more
Share this page with your friends




whatsapp